default search action
IACR Transactions on Symmetric Cryptology, Volume 2016
Volume 2016, Number 1, 2016
- Jérémy Jean:
Cryptanalysis of Haraka. 1-12 - Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. 13-32 - Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. 33-56 - Tomer Ashur, Yunwen Liu:
Rotational Cryptanalysis in the Presence of Constants. 57-70 - Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia:
Quantum Differential and Linear Cryptanalysis. 71-94 - Sumanta Sarkar, Habeeb Syed:
Lightweight Diffusion Layer: Importance of Toeplitz Matrices. 95-113 - Colin Chaigneau, Henri Gilbert:
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? 114-133 - Tetsu Iwata, Kazuhiko Minematsu:
Stronger Security Variants of GCM-SIV. 134-157 - Atul Luykx, Bart Mennink, Samuel Neves:
Security Analysis of BLAKE2's Modes of Operation. 158-176
Volume 2016, Number 2, 2016
- Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications. 1-29 - Ritam Bhaumik, Mridul Nandi:
OleF: an Inverse-Free Online Cipher. An Online SPRP with an Optimal Inverse-Free Construction. 30-51 - Vasily Mikhalev, Frederik Armknecht, Christian Müller:
On Ciphers that Continuously Access the Non-Volatile Key. 52-79 - Victor Cauchois, Pierre Loidreau, Nabil Merkiche:
Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes. 80-98 - Léo Perrin, Aleksei Udovenko:
Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog. 99-124 - Guillaume Endignoux, Damian Vizár:
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models. 125-144 - Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. 145-161 - Céline Blondeau, Kaisa Nyberg:
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis. 162-191 - Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
Subspace Trail Cryptanalysis and its Applications to AES. 192-225 - Alex Biryukov, Dmitry Khovratovich, Léo Perrin:
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. 226-247 - Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel:
Practical Key-Recovery Attack on MANTIS5. 248-260 - Arka Rai Choudhuri, Subhamoy Maitra:
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha. 261-287 - Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang:
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP. 288-306 - Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. 307-337
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.