


default search action
IACR Transactions on Symmetric Cryptology, Volume 2025
Volume 2025, Number 1, 2025
- Christoph Dobraunig, Kazuhiko Minematsu:

Preface to Volume 2025, Issue 1. 1-4 - Dachao Wang, Alexander Maximov, Patrik Ekdahl, Thomas Johansson:

A New Stand-Alone MAC Construct Called SMAC. 5-43 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:

Committing Wide Encryption Mode with Minimum Ciphertext Expansion. 44-69 - Bart Mennink:

Keying Merkle-Damgård at the Suffix. 70-96 - Charlotte Lefevre

, Mario Marhuenda Beltrán
, Bart Mennink:
To Pad or Not to Pad? Padding-Free Arithmetization-Oriented Sponges. 97-137 - Charlotte Lefevre, Bart Mennink:

SoK: Security of the Ascon Modes. 138-210 - Mustafa Khairallah:

Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD More Applications of Pseudo-Random Injections. 211-239 - Matthias Johann Steiner

:
Gröbner Basis Cryptanalysis of Ciminion and Hydra. 240-275 - Jens Alich

, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander
, Willi Meier, Lukas Stennes:
Observations on TETRA Encryption Algorithm TEA-3. 276-308 - Cihangir Tezcan

, Gregor Leander
:
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA. 309-327 - Xiaoen Lin, Le He, Hongbo Yu:

Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]. 328-356 - Runhao Wei, Jinliang Wang, Haoyang Wang

, Muzhou Li, Yunling Zhang, Meiqin Wang:
A More Practical Attack Against Yoroi. 357-379 - Roberto Avanzi, Orr Dunkelman, Shibam Ghosh:

Differential Cryptanalysis of the Reduced Pointer Authentication Code Function Used in Arm's FEAT_PACQARMA3 Feature. 380-419 - Sabyasachi Dey, Subhamoy Maitra, Santanu Sarkar, Nitin Kumar Sharma

:
Significantly Improved Cryptanalysis of Salsa20 with Two-Round Criteria. 420-443 - Xinhao Zeng, Lin Tan, Hong Xu:

Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP. 444-470 - Marcel Nageler

, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder
:
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions. 471-514 - Christina Boura, Patrick Derbez, Baptiste Germon:

Extending the Quasidifferential Framework: From Fixed-Key to Expected Differential Probability. 515-541 - Alex Biryukov, Baptiste Lambin, Aleksei Udovenko:

Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations. 542-591 - Chenhao Jia, Tingting Cui, Qing Ling, Yan He

, Kai Hu, Yu Sun, Meiqin Wang:
How Small Can S-boxes Be? 592-622 - Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin:

Corrigendum to Fast AES-Based Universal Hash Functions and MACs. 623-628
Volume 2025, Number 2, 2025
- Irati Manterola Ayala, Håvard Raddum:

Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli. 1-15 - Zhengrong Lu, Hongbo Yu, Xiaoen Lin, Sitong Yuan:

Collision Attacks on Reduced RIPEMD-128. 16-33 - Lorenzo Grassi

, Katharina Koschatko
, Christian Rechberger:
Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails. 34-86 - Antoine Bak, Léo Perrin:

On the Security of Split-and-Lookup-Based ZK-Friendly Primitives. 87-123 - Kaveh Bashiri, Xavier Bonnetain, Akinori Hosoyamada, Nathalie Lang

, André Schrottenloher:
Improved Quantum Linear Attacks and Application to CAST. 124-165 - Xiaobin Yu, Meicheng Liu:

Multiple Rows Mixers and Hsilu A Family of Linear Layers and a Permutation with Fewer XORs. 166-191 - Yu Sun, Lixuan Wu, Chenhao Jia, Tingting Cui, Kai Hu, Meiqin Wang:

Addendum to How Small Can S-boxes Be? 192-205
Volume 2025, Number 3, 2025
- Roberto Avanzi, Avik Chakraborti, Bishwajit Chakraborty, Eik List:

The Large Block Cipher Vistrutah. 1-150 - Yu Zhang, Xianhui Lu, Yijian Liu, Yongjian Yin, Kunpeng Wang:

LEAP: High-Performance Lattice-Based Pseudorandom Number Generator. 151-182 - Nilanjan Datta, Avijit Dutta, Shibam Ghosh, Eik List, Hrithik Nandi

:
HCTR+: An Optimally Secure TBC-Based Accordion Mode. 183-229 - Bart Mennink:

Minimized PRFs from Public Permutations. 230-260 - Isamu Furuya, Kazuhiko Minematsu:

Revisiting Vector-Input MACs. 261-288 - Christina Boura, Geoffroy Couteau, Léo Perrin, Yann Rotella:

SoK: On Shallow Weak PRFs A Common Symmetric Building Block for MPC Protocols. 289-336 - Antoine Bak, Guilhem Jazeron, Pierre Galissant, Léo Perrin:

Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving Applications to Round-Reduced Monolith and Full-Round Skyscraper. 337-367 - Yinuo Liu, Tian Tian, Jing Yang:

Multidimensional Linear Cryptanalysis of AEGIS. 368-399 - Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham:

Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More. 400-443 - Tim Beyne, Addie Neyt:

Improved Differential Cryptanalysis of SPEEDY. 444-474 - Thomas Peyrin, Quan Quan Tan, Hongyi Zhang, Chunning Zhou:

Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers. 475-515 - Kazuma Taka, Kosei Sakamoto, Ryoma Ito

, Rentaro Shiba, Shion Utsumi, Takanori Isobe:
Divide-and-Conquer SAT for Exploring Optimal Differential and Linear Characteristics and Its Applications. 516-576 - Guozhen Liu, Shun Li, Huina Li, Weidong Qiu, Siwei Sun:

SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis. 577-632 - Lingyue Qin, Boxin Zhao, Qingliang Hou, Keting Jia, Gaoli Wang, Xiaoyang Dong:

Linear Cancellations in the MitM Attacks on Sponge Functions. 633-692 - Chengcheng Chang, Hosein Hadipour

, Kai Hu, Muzhou Li
, Meiqin Wang:
Mix-Basis Geometric Approach to Boomerang Distinguishers. 693-728 - Cihangir Tezcan

, Gregor Leander
, Hosein Hadipour
:
Cryptanalysis: Theory Versus Practice Correcting Cryptanalysis Results on Ascon, ChaCha, and Serpent Using GPUs. 729-754 - Zezhou Hou, Zhenzhen Bao, Jinyu Lu, Shaozhen Chen:

Observations on the BayesianKeySearch with Applications to Simon and Simeck. 755-799 - Samuele Andreoli

, Gregor Leander, Enrico Piccione, Lukas Stennes:
Generalizations of ChiChi: Families of Low-Latency Permutations in Any Even Dimension. 800-826 - Baofeng Wu, Wen Kong, Dewei Kong, Hailun Yan:

MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction. 827-867 - Yan He

, Tingting Cui, Qing Ling, Xi Han:
New General MDS Matrix Construction Method Towards Low Area. 868-890

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














