Advances in Cryptology – ASIACRYPT 2020
26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II
Book and Conference Proceedings
26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II
Book and Conference Proceedings
26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III
Book and Conference Proceedings
26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I
Book and Conference Proceedings
25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Book and Conference Proceedings
25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III
Chapter and Conference Paper
Currently, TLS1.0 is one of the most widely deployed protocol versions for SSL/TLS. In TLS1.0, there are only two choices for the bulk encryption, i.e., RC4 or block ciphers in the CBC mode, which have been cr...
Chapter and Conference Paper
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e., the same interface specifications as the Advanced Encryption Standard (AES). Eff...
Chapter and Conference Paper
This paper studies the security offered by the block cipher E2 against truncated differential cryptanalysis. At FSE’99 Matsui and Tokita showed a possible attack on an 8-round variant of E2 without IT-Function (t...
Chapter and Conference Paper
Block ciphers are usually basedon one top-level scheme into which we plug “roundf unctions”. To analyze security, it is important to study the intrinsic security provided by the top-level scheme from the viewp...
Chapter and Conference Paper
This paper introduces an improved higher order differential attack using chosen higher order differences. We can find a lower order of the higher order differential by choosing higher order differences. It fol...
Chapter and Conference Paper
Since the proposal of differential cryptanalysis and linear cryptanalysis in 1991 and 1993, respectively, the resistance to these cryptanalyses have been studied for many cryptosystems. Moreover, some block ci...
Chapter and Conference Paper
This paper improves the fast DES implementation in software proposed by Biham at the 4-th Fast Software Encryption Workshop. That is, we propose a new algorithm which reduces the number of instructions for com...
Chapter and Conference Paper
We give stricter upper bounds to the probabilities of differential and linear hull of DES-like ciphers than the previous results. The previous results in [6, 7] said that every r-round differential (or linear ...
Chapter and Conference Paper
It is important to find the best linear expression to estimate the vulnerability of crytosystems to Linear Cryptanalysis. This paper presents a method to improve Matsui’s search algorithm which determines the ...