default search action
IACR Transactions on Symmetric Cryptology, Volume 2020
Volume 2020, Number 1, 2020
- Gaëtan Leurent, Yu Sasaki:
Preface to Volume 2020, Issue 1. 1-5 - Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction. 6-42 - Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. 43-120 - Bertram Poettering, Paul Rösler:
Combiners for AEAD. 121-143 - Begül Bilgin, Lauren De Meyer, Sébastien Duval, Itamar Levi, François-Xavier Standaert:
Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking. 144-184 - Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay:
Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers. 185-232 - Augustin Bariant, Nicolas David, Gaëtan Leurent:
Cryptanalysis of Forkciphers. 233-265 - Jing Yang, Thomas Johansson, Alexander Maximov:
Spectral analysis of ZUC-256. 266-288 - Christoph Dobraunig, Yann Rotella, Jan Schoone:
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96. 289-312 - Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto:
Cryptanalysis of the Legendre PRF and Generalizations. 313-330 - Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier:
On the Feistel Counterpart of the Boomerang Connectivity Table Introduction and Analysis of the FBCT. 331-362 - Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Links between Division Property and Other Cube Attack Variants. 363-395 - Kai Hu, Qingju Wang, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layers. 396-424 - Yaobin Shen, Chun Guo, Lei Wang:
Improved Security Bounds for Generalized Feistel Networks. 425-457
Volume 2020, Number S1, 2020
- Itai Dinur, Gaëtan Leurent:
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process. 1-4 - Tim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink:
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus. 5-30 - Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. 31-59 - Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer:
Xoodyak, a lightweight cryptographic scheme. 60-87 - Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
SKINNY-AEAD and SKINNY-Hash. 88-131 - Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. 132-159 - Anne Canteaut, Sébastien Duval, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, André Schrottenloher:
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security. 160-207 - Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. 208-261 - Joan Daemen, Pedro Maat Costa Massolino, Alireza Mehrdad, Yann Rotella:
The Subterranean 2.0 Cipher Suite. 262-294 - Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert, Balazs Udvarhelyi, Friedrich Wiemer:
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher. 295-349 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode. 350-389 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer:
Isap v2.0. 390-416 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Snehal Mitragotri, Mridul Nandi:
From Combined to Hybrid: Making Feedback-based AE even Smaller. 417-445
Volume 2020, Number 2, 2020
- Avik Chakraborti, Mridul Nandi, Suprita Talnikar, Kan Yasuda:
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security. 1-39 - Jeroen Pijnenburg, Bertram Poettering:
Key Assignment Schemes with Authenticated Encryption, revisited. 40-67 - Ryota Nakamichi, Tetsu Iwata:
Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys. 68-92 - Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi:
On the Security of Sponge-type Authenticated Encryption Modes. 93-119 - Zejun Xiang, Xiangyong Zeng, Da Lin, Zhenzhen Bao, Shasha Zhang:
Optimizing Implementations of Linear Layers. 120-145
Volume 2020, Number 3, 2020
- Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec:
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols. 1-45 - Phil Hebborn, Gregor Leander:
Dasta - Alternative Linear Layer for Rasta. 46-86 - Kazuhiko Minematsu:
Fast Decryption: a New Feature of Misuse-Resistant AE. 87-118 - Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. 119-151 - Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. 152-174 - Charles Bouillaguet, Florette Martinez, Julia Sauvage:
Practical seed-recovery for the PCG Pseudo-Random Number Generator. 175-196 - Zhenzhen Bao, Jian Guo, Eik List:
Extended Truncated-differential Distinguishers on Round-reduced AES. 197-261 - Ling Sun, David Gérault, Wei Wang, Meiqin Wang:
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers. 262-287 - Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property. 288-304 - Yuan Gao, Chun Guo, Meiqin Wang, Weijia Wang, Jiejing Wen:
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. 305-326 - Christina Boura, Daniel Coggia:
Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers. 327-361 - Aldo Gunsing, Joan Daemen, Bart Mennink:
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers. 362-366 - Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja:
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. 367-391
Volume 2020, Number 4, 2020
- Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security. 1-38 - Wonseok Choi, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Eik List, Kazuhiko Minematsu, Yusuke Naito:
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. 39-70 - Hwigyeom Kim, Yeongmin Lee, Jooyoung Lee:
Forking Tweakable Even-Mansour Ciphers. 71-87 - Patrick Derbez, Pierre-Alain Fouque, Victor Mollimard:
Fake Near Collisions Attacks. 88-103 - Stéphanie Delaune, Patrick Derbez, Mathieu Vavrille:
Catching the Fastest Boomerangs Application to SKINNY. 104-129 - Subhadeep Banik, Khashayar Barooti, F. Betül Durak, Serge Vaudenay:
Cryptanalysis of LowMC instances using single plaintext/ciphertext pair. 130-146 - Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki:
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers. 147-172 - Patrick Derbez, Pierre-Alain Fouque:
Increasing Precision of Division Property. 173-194 - Christoph Dobraunig, Bart Mennink:
Tightness of the Suffix Keyed Sponge Bound. 195-212
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.