Skip to main content

previous disabled Page of 2
and
  1. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  2. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  3. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  4. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  5. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  6. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  7. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  8. No Access

    Chapter and Conference Paper

    New Attacks from Old Distinguishers Improved Attacks on Serpent

    Serpent was originally proposed in 1998 and is one of the most studied block ciphers. In this paper we improve knowledge of its security by providing the current best attack on this cipher, which is a 12-round...

    Marek Broll, Federico Canale, Nicolas David in Topics in Cryptology – CT-RSA 2022 (2022)

  9. Chapter and Conference Paper

    Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2

    This paper presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, we show that the initial state of GEA-1 can be recovered from a...

    Christof Beierle, Patrick Derbez, Gregor Leander in Advances in Cryptology – EUROCRYPT 2021 (2021)

  10. No Access

    Chapter and Conference Paper

    PRINCEv2

    In this work, we propose tweaks to the PRINCE block cipher that help us to increase its security without changing the number of rounds or round operations. We get substantially higher security for the same comple...

    Dušan Božilov, Maria Eichlseder, Miroslav Knežević in Selected Areas in Cryptography (2021)

  11. No Access

    Chapter and Conference Paper

    Generic Framework for Key-Guessing Improvements

    We propose a general technique to improve the key-guessing step of several attacks on block ciphers. This is achieved by defining and studying some new properties of the associated S-boxes and by representing ...

    Marek Broll, Federico Canale in Advances in Cryptology – ASIACRYPT 2021 (2021)

  12. No Access

    Chapter and Conference Paper

    Weak-Key Distinguishers for AES

    In this paper, we analyze the security of AES in the case in which the whitening key is a weak key.

    Lorenzo Grassi, Gregor Leander, Christian Rechberger in Selected Areas in Cryptography (2021)

  13. No Access

    Chapter and Conference Paper

    Strong and Tight Security Guarantees Against Integral Distinguishers

    Integral attacks belong to the classical attack vectors against any given block ciphers. However, providing arguments that a given cipher is resistant against those attacks is notoriously difficult. In this p...

    Phil Hebborn, Baptiste Lambin, Gregor Leander in Advances in Cryptology – ASIACRYPT 2021 (2021)

  14. Chapter and Conference Paper

    Lower Bounds on the Degree of Block Ciphers

    Only the method to estimate the upper bound of the algebraic degree on block ciphers is known so far, but it is not useful for the designer to guarantee the security. In this paper we provide meaningful lower...

    Phil Hebborn, Baptiste Lambin, Gregor Leander in Advances in Cryptology – ASIACRYPT 2020 (2020)

  15. Chapter and Conference Paper

    Modeling for Three-Subset Division Property Without Unknown Subset

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application to stream ciphers,...

    Yonglin Hao, Gregor Leander, Willi Meier in Advances in Cryptology – EUROCRYPT 2020 (2020)

  16. Chapter and Conference Paper

    Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems

    The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been develop...

    Tim Beyne, Anne Canteaut, Itai Dinur in Advances in Cryptology – CRYPTO 2020 (2020)

  17. Chapter and Conference Paper

    Improved Differential-Linear Attacks with Applications to ARX Ciphers

    We present several improvements to the framework of differential-linear attacks with a special focus on ARX ciphers. As a demonstration of their impact, we apply them to Chaskey and ChaCha and we are able to s...

    Christof Beierle, Gregor Leander, Yosuke Todo in Advances in Cryptology – CRYPTO 2020 (2020)

  18. No Access

    Chapter and Conference Paper

    Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions

    This article presents universal forgery and multiple forgeries against MergeMAC that has been recently proposed to fit scenarios where bandwidth is limited and where strict time constraints apply. MergeMAC div...

    Tetsu Iwata, Virginie Lallemand, Gregor Leander in Topics in Cryptology – CT-RSA 2019 (2019)

  19. No Access

    Article

    Strong 8-bit Sboxes with efficient masking in hardware extended version

    Block ciphers are arguably the most important cryptographic primitive in practice. While their security against mathematical attacks is rather well understood, physical threats such as side-channel analysis (S...

    Erik Boss, Vincent Grosso, Tim Güneysu in Journal of Cryptographic Engineering (2017)

  20. Chapter and Conference Paper

    Proving Resistance Against Invariant Attacks: How to Choose the Round Constants

    Many lightweight block ciphers apply a very simple key schedule in which the round keys only differ by addition of a round-specific constant. Generally, there is not much theory on how to choose appropriate co...

    Christof Beierle, Anne Canteaut, Gregor Leander in Advances in Cryptology – CRYPTO 2017 (2017)

previous disabled Page of 2