


default search action
IACR Transactions on Symmetric Cryptology, Volume 2023
Volume 2023, Number 1, 2023
- Christina Boura, Bart Mennink:

Preface to Volume 2023, Issue 1. 1-4 - Benoît Cogliati, Jordan Ethan

, Ashwin Jha:
Subverting Telegram's End-to-End Encryption. 5-40 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:

Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. 41-66 - Marcel Nageler

, Felix Pallua, Maria Eichlseder
:
Finding Collisions for Round-Reduced Romulus-H. 67-88 - Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra:

Cryptanalysis of Reduced Round ChaCha - New Attack & Deeper Analysis. 89-110 - Ling Sun, Meiqin Wang

:
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations. 111-151 - Dachao Wang, Baocang Wang, Siwei Sun:

SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers. 152-191 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar

:
Tight Multi-User Security Bound of DbHtS. 192-223 - Charlotte Lefevre:

Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks. 224-243 - Shanjie Xu, Qi Da, Chun Guo:

Chosen-Key Secure Even-Mansour Cipher from a Single Permutation. 244-287 - Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert:

Secure Message Authentication in the Presence of Leakage and Faults. 288-315
Volume 2023, Number 2, 2023
- Bart Mennink:

Understanding the Duplex and Its Security. 1-46 - Yaobin Shen, François-Xavier Standaert:

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. 47-68 - Christoph Dobraunig

, Bart Mennink, Samuel Neves
:
EliMAC: Speeding Up LightMAC by around 20%. 69-93 - Lorenzo Grassi

:
Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives. 94-131 - Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang

, Puwen Wei, Zeyu Xu
:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. 132-175 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:

Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256. 176-188 - Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin

:
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP. 189-223 - Zhiyu Zhang

, Siwei Sun, Caibing Wang, Lei Hu:
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. 224-252
Volume 2023, Number 3, 2023
- Koustabh Ghosh

, Parisa Amiri-Eliasi, Joan Daemen:
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication. 1-24 - Roberto Avanzi, Subhadeep Banik

, Orr Dunkelman, Maria Eichlseder
, Shibam Ghosh, Marcel Nageler
, Francesco Regazzoni
:
The QARMAv2 Family of Tweakable Block Ciphers. 25-73 - Huina Li

, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach. 74-100 - Xavier Bonnetain, Virginie Lallemand:

On Boomerang Attacks on Quadratic Feistel Ciphers New results on KATAN and Simon. 101-145 - André Schrottenloher, Marc Stevens

:
Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks. 146-183 - Emanuele Bellini, David Gérault, Anna Hambitzer, Matteo Rossi:

A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences. 184-212 - Shahram Rasoolzadeh:

Classification of All t-Resilient Boolean Functions with t + 4 Variables. 213-226
Volume 2023, Number 4, 2023
- Betül Askin Özdemir, Tim Beyne

, Vincent Rijmen
:
Multidimensional Linear Cryptanalysis of Feistel Ciphers. 1-27 - Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:

Revisiting Yoyo Tricks on AES. 28-57 - Gregor Leander

, Shahram Rasoolzadeh, Lukas Stennes:
Cryptanalysis of HALFLOOP Block Ciphers Destroying HALFLOOP-24. 58-82 - Bin Zhang, Ruitao Liu, Xinxin Gong, Lin Jiao:

Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher. 83-111 - Yingxin Li, Fukang Liu, Gaoli Wang:

Automating Collision Attacks on RIPEMD-160. 112-142 - Yimeng Sun, Jiamin Cui

, Meiqin Wang:
Improved Attacks on LowMC with Algebraic Techniques. 143-165 - Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier:

Algebraic Attacks on RAIN and AIM Using Equivalent Representations. 166-186 - Silvia Mella, Joan Daemen, Gilles Van Assche:

Tighter Trail Bounds for Xoodoo. 187-214 - Christina Boura, Patrick Derbez, Margot Funk:

Related-Key Differential Analysis of the AES. 215-243 - Tim Beyne

, Michiel Verbauwhede
:
Integral Cryptanalysis Using Algebraic Transition Matrices. 244-269 - Aurélien Boeuf, Anne Canteaut, Léo Perrin:

Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES. 270-298 - Jules Baudrin, Patrick Felke, Gregor Leander

, Patrick Neumann
, Léo Perrin, Lukas Stennes:
Commutative Cryptanalysis Made Practical. 299-329 - Benoît Cogliati, Jordan Ethan

, Ashwin Jha, Soumya Kanti Saha:
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing. 330-364 - Nilanjan Datta, Shreya Dey

, Avijit Dutta, Sougata Mandal
:
Cascading Four Round LRW1 is Beyond Birthday Bound Secure. 365-390 - Niranjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal:

Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes. 391-419 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara

:
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode. 420-451 - Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito

, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. 452-488 - Haotian Shi

, Xiutao Feng, Shengyuan Xu
:
A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers. 489-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














