default search action
IACR Transactions on Symmetric Cryptology, Volume 2018
Volume 2018, Number 1, 2018
- Florian Mendel, María Naya-Plasencia:
Preface to Volume 2018, Issue 1. 1-4 - Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song:
Key-Recovery Attacks on Full Kravatte. 5-28 - Thomas Fuhr, María Naya-Plasencia, Yann Rotella:
State-Recovery Attacks on Modified Ketje Jr. 29-56 - Tao Huang, Hongjun Wu:
Distinguishing Attack on NORX Permutation. 57-73 - Gregor Leander, Cihangir Tezcan, Friedrich Wiemer:
Searching for Subspace Trails and Truncated Differentials. 74-100 - Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre:
Multivariate Profiling of Hulls for Linear Cryptanalysis. 101-125 - Ko Stoffelen, Joan Daemen:
Column Parity Mixers. 126-159 - Yongqiang Li, Shizhu Tian, Yuyin Yu, Mingsheng Wang:
On the Generalization of Butterfly Structure. 160-179 - Lijing Zhou, Licheng Wang, Yiru Sun:
On Efficient Constructions of Lightweight MDS Matrices. 180-200 - Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. 201-253 - Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque:
Revisiting and Improving Algorithms for the 3XOR Problem. 254-276 - Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. 277-313 - Srimanta Bhattacharya, Mridul Nandi:
Revisiting Variable Output Length XOR Pseudorandom Function. 314-335 - Serge Fehr, Pierre Karpman, Bart Mennink:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers. 336-352
Volume 2018, Number 2, 2018
- Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni:
Towards Low Energy Stream Ciphers. 1-19 - Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. 20-47 - Sébastien Duval, Gaëtan Leurent:
MDS Matrices with Lightweight Circuits. 48-78 - Stian Fauskanger, Igor A. Semaev:
Separable Statistics and Multidimensional Linear Cryptanalysis. 79-110 - Maria Eichlseder, Daniel Kales:
Clustering Related-Tweak Characteristics: Application to MANTIS-6. 111-132 - Lorenzo Grassi:
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES. 133-160 - Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. 161-191
Volume 2018, Number 3, 2018
- Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser:
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. 1-35 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. 36-92 - Ling Sun, Wei Wang, Meiqin Wang:
More Accurate Differential Properties of LED64 and Midori64. 93-123 - Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri:
Cryptanalysis of Reduced round SKINNY Block Cipher. 124-162 - Christian Rechberger, Hadi Soleimany, Tyge Tiessen:
Cryptanalysis of Low-Data Instances of Full LowMCv2. 163-181 - Ling Song, Jian Guo:
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. 182-214 - Eli Biham, Stav Perle:
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity. 215-264 - Mathias Hall-Andersen, Philip S. Vejre:
Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials. 265-289 - Christina Boura, Anne Canteaut:
On the Boomerang Uniformity of Cryptographic Sboxes. 290-310 - Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules. 311-334
Volume 2018, Number 4, 2018
- Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer:
The design of Xoodoo and Xoofff. 1-38 - Paul Crowley, Eric Biggers:
Adiantum: length-preserving encryption for entry-level processors. 39-61 - Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic:
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. 62-79 - Christof Beierle, Anne Canteaut, Gregor Leander:
Nonlinear Approximations in Cryptanalysis Revisited. 80-101 - Dhiman Saha, Mostafizar Rahman, Goutam Paul:
New Yoyo Tricks with AES-based Permutations. 102-127 - Bart Mennink:
Key Prediction Security of Keyed Sponges. 128-149 - Suyash Kandele, Souradyuti Paul:
Key Assignment Scheme with Authenticated Encryption. 150-196 - Joan Daemen, Bart Mennink, Gilles Van Assche:
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers. 197-228
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.