


default search action
IACR Transactions on Symmetric Cryptology, Volume 2024
Volume 2024, Number 1, 2024
- Christina Boura, Kazuhiko Minematsu:

Preface to Volume 2024, Issue 1. 1-4 - John Kelsey

, Stefan Lucks, Stephan Müller:
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF. 5-34 - Wonseok Choi, Jooyoung Lee, Yeongmin Lee:

Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds. 35-70 - Charlotte Lefevre, Bart Mennink:

Permutation-Based Hashing Beyond the Birthday Bound. 71-113 - Yuchao Chen, Tingting Guo

, Lei Hu, Lina Shang, Shuping Mao
, Peng Wang
:
Small Stretch Problem of the DCT Scheme and How to Fix It. 114-134 - Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher:

Key Committing Attacks against AES-based AEAD Schemes. 135-157 - Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang:

Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. 158-187 - Hosein Hadipour

, Yosuke Todo:
Cryptanalysis of QARMAv2. 188-213 - Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier:

Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions. 214-233 - Hosein Hadipour

, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder
:
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. 234-325 - Qing Ling, Tingting Cui, Hongtao Hu, Sijia Gong, Zijun He, Jiali Huang, Jia Xiao:

Finding Impossible Differentials in ARX Ciphers under Weak Keys. 326-356 - Matthias Johann Steiner

:
Solving Degree Bounds for Iterated Polynomial Systems. 357-411 - Patrick Derbez, Marie Euler:

Equivalence of Generalised Feistel Networks. 412-440 - Gaëtan Leurent, Clara Pernot:

Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation. 441-458 - Henk Berendsen, Bart Mennink:

Tightening Leakage Resilience of the Suffix Keyed Sponge. 459-496 - Patrick Struck

, Maximiliane Weishäupl:
Constructing Committing and Leakage-Resilient Authenticated Encryption. 497-528
Volume 2024, Number 2, 2024
- Yaobin Shen, Thomas Peters, François-Xavier Standaert:

Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate. 1-34 - Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin:

Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac. 35-67 - Jinliang Wang, Christina Boura, Patrick Derbez, Kai Hu, Muzhou Li, Meiqin Wang:

Cryptanalysis of Full-Round BipBip. 68-84 - Ryunouchi Takeuchi, Yosuke Todo, Tetsu Iwata:

Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security. 85-117 - Kai Hu:

Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings with a Break-Fix Strategy. 118-140 - Yinuo Liu, Jing Yang, Tian Tian:

Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G. 141-165 - Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi:

Differential-Linear Cryptanalysis of Reduced Round ChaCha. 166-189 - Chen Liu, Tian Tian:

Dynamic Cube Attacks against Grain-128AEAD. 190-221 - Xavier Bonnetain, Margarita Cordero, Virginie Lallemand, Marine Minier, María Naya-Plasencia:

On Impossible Boomerang Attacks Application to Simon and SKINNYee. 222-253 - Jianing Zhang, Haoyang Wang

, Deng Tang:
Impossible Boomerang Attacks Revisited Applications to Deoxys-BC, Joltik-BC and SKINNY. 254-295 - Zejun Xiang, Xiaoyu Wang, Bo Yu, Bing Sun, Shasha Zhang, Xiangyong Zeng, Xuan Shen, Nian Li:

Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials. 296-321 - Yufei Yuan

, Wenling Wu, Tairong Shi, Lei Zhang, Yu Zhang
:
A Framework to Improve the Implementations of Linear Layers. 322-347 - Chandranan Dhar, Jordan Ethan

, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal
:
Context-Committing Security of Leveled Leakage-Resilient AEAD. 348-370
Volume 2024, Number 3, 2024
- Mingyu Cho, Woohyuk Chung

, Jincheol Ha
, Jooyoung Lee, Eun-Gyeol Oh, Mincheol Son:
FRAST: TFHE-Friendly Cipher Based on Random S-Boxes. 1-43 - Lorenzo Grassi

, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations. 44-83 - Debasmita Chakraborty

, Hosein Hadipour
, Phuong Hoa Nguyen
, Maria Eichlseder
:
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs. 84-176 - Kai Hu, Trevor Yap

:
Perfect Monomial Prediction for Modular Addition. 177-199 - Raghvendra Rohit, Sumanta Sarkar:

Reconstructing S-Boxes from Cryptographic Tables with Milp. 200-237 - Dongjae Lee

, Seokhie Hong:
Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256. 238-265 - Xavier Bonnetain, André Schrottenloher:

Single-Query Quantum Hidden Shift Attacks. 266-297 - Shahram Rasoolzadeh:

Addendum to Classification of All t-Resilient Boolean Functions with t + 4 Variables Classification of Quadratic and Cubic t-Resilient Boolean Functions with t + 5 Variables. 298-301
Volume 2024, Number 4, 2024
- Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang:

Symmetric Twin Column Parity Mixers and Their Applications. 1-37 - Min Zhang, Yao Sun:

A New Practical Cube Attack via Recovering Numerous Superpolys. 38-63 - Shiyao Chen, Xiaoyang Dong, Jian Guo, Tianyu Zhang:

Chosen-Prefix Collisions on AES-like Hashing. 64-96 - Fukang Liu, Katharina Koschatko

, Lorenzo Grassi
, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier:
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith. 97-137 - Katharina Koschatko

, Reinhard Lüftenegger, Christian Rechberger:
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi. 138-190 - Juliane Krämer, Patrick Struck, Maximiliane Weishäupl:

Committing AE from Sponges Security Analysis of the NIST LWC Finalists. 191-248 - Charlotte Lefevre, Bart Mennink:

Permutation-Based Hash Chains with Application to Password Hashing. 249-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














