Skip to main content

and
  1. No Access

    Article

    Improved Differential-Linear Attacks with Applications to ARX Ciphers

    We present several improvements to the framework of differential-linear attacks with a special focus on ARX ciphers. As a demonstration of their impact, we apply them to Chaskey and ChaCha and we are able to s...

    Christof Beierle, Marek Broll, Federico Canale, Nicolas David in Journal of Cryptology (2022)

  2. No Access

    Article

    Sycon: a new milestone in designing ASCON-like permutations

    ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight applications in the CAESAR competition, which also has been submit...

    Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar in Journal of Cryptographic Engineering (2022)

  3. No Access

    Article

    Modeling for Three-Subset Division Property without Unknown Subset

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application to stream ciphers, ...

    Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang in Journal of Cryptology (2021)

  4. Article

    Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64

    In this paper, we introduce a new type of attack, called nonlinear invariant attack. As application examples, we present new attacks that are able to distinguish the full versions of the (tweakable) block ciphers...

    Yosuke Todo, Gregor Leander, Yu Sasaki in Journal of Cryptology (2019)

  5. Article

    Integral Cryptanalysis on Full MISTY1

    MISTY1 is a block cipher designed by Matsui in 1997. It was well evaluated and standardized by projects, such as CRYPTREC, ISO/IEC, and NESSIE. In this paper, we propose a key recovery attack on the full MISTY...

    Yosuke Todo in Journal of Cryptology (2017)