


default search action
44th CRYPTO 2024, Santa Barbara, CA, USA - Part IV
- Leonid Reyzin, Douglas Stebila

:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14923, Springer 2024, ISBN 978-3-031-68384-8
Symmetric Cryptanalysis
- Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:

Generic MitM Attack Frameworks on Sponge Constructions. 3-37 - Hosein Hadipour

, Patrick Derbez
, Maria Eichlseder
:
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. 38-72 - Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang:

Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations. 73-104 - Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:

Improving Generic Attacks Using Exceptional Functions. 105-138 - Augustin Bariant, Aurélien Boeuf, Axel Lemoine

, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. 139-173 - Ting Peng, Wentao Zhang, Jingsui Weng, Tianyou Ding:

New Approaches for Estimating the Bias of Differential-Linear Distinguishers. 174-205 - Gildas Avoine

, Xavier Carpent
, Tristan Claverie, Christophe Devine, Diane Leblanc-Albarel
:
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM. 206-240 - Zhongyi Zhang

, Chengan Hou
, Meicheng Liu
:
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3. 241-272
Symmetric Cryptography
- Bing Sun, Zejun Xiang, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu:

Feistel-Like Structures Revisited: Classification and Cryptanalysis. 275-304 - Mihir Bellare, Viet Tung Hoang:

Succinctly-Committing Authenticated Encryption. 305-339 - Gregor Leander

, Christof Paar
, Julian Speith
, Lukas Stennes
:
HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits. 340-376 - Fangqi Dong, Qipeng Liu

, Kewen Wu
:
Tight Characterizations for Preprocessing Against Cryptographic Salting. 377-411 - Björn Kriepke

, Gohar M. Kyureghyan
:
Algebraic Structure of the Iterates of χ. 412-424 - Ritam Bhaumik

, Bishwajit Chakraborty
, Wonseok Choi
, Avijit Dutta
, Jérôme Govinden
, Yaobin Shen:
The Committing Security of MACs with Applications to Generic Composition. 425-462 - Tim Beyne

, Yu Long Chen:
Information-Theoretic Security with Asymmetries. 463-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














