Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing

    In some linear key recovery attacks, the function which determines the value of the linear approximation from the plaintext, ciphertext and key is replaced by a similar map in order to improve the time or memo...

    Antonio Flórez-Gutiérrez, Yosuke Todo in Advances in Cryptology – EUROCRYPT 2024 (2024)

  2. No Access

    Article

    Sycon: a new milestone in designing ASCON-like permutations

    ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight applications in the CAESAR competition, which also has been submit...

    Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar in Journal of Cryptographic Engineering (2022)

  3. No Access

    Chapter and Conference Paper

    A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs

    Incompressibility is one of the most fundamental security goals in white-box cryptography. Given recent advances in the design of efficient and incompressible block ciphers such as SPACE, SPNbox and WhiteBlock, w...

    Akinori Hosoyamada, Takanori Isobe, Yosuke Todo in Advances in Cryptology – ASIACRYPT 2022 (2022)

  4. No Access

    Chapter and Conference Paper

    New Attacks from Old Distinguishers Improved Attacks on Serpent

    Serpent was originally proposed in 1998 and is one of the most studied block ciphers. In this paper we improve knowledge of its security by providing the current best attack on this cipher, which is a 12-round...

    Marek Broll, Federico Canale, Nicolas David in Topics in Cryptology – CT-RSA 2022 (2022)

  5. No Access

    Chapter and Conference Paper

    Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR

    In this paper, we develop an S-box designing method by considering an interplay between an S-box and a linear layer, which enhances security against differential cryptanalysis. The basic idea can be found in b...

    Yosuke Todo, Yu Sasaki in Selected Areas in Cryptography (2022)

  6. No Access

    Chapter and Conference Paper

    PRINCEv2

    In this work, we propose tweaks to the PRINCE block cipher that help us to increase its security without changing the number of rounds or round operations. We get substantially higher security for the same comple...

    Dušan Božilov, Maria Eichlseder, Miroslav Knežević in Selected Areas in Cryptography (2021)

  7. No Access

    Chapter and Conference Paper

    Massive Superpoly Recovery with Nested Monomial Predictions

    Determining the exact algebraic structure or some partial information of the superpoly for a given cube is a necessary step in the cube attack – a generic cryptanalytic technique for symmetric-key primitives ...

    Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang in Advances in Cryptology – ASIACRYPT 2021 (2021)

  8. No Access

    Chapter and Conference Paper

    Strong and Tight Security Guarantees Against Integral Distinguishers

    Integral attacks belong to the classical attack vectors against any given block ciphers. However, providing arguments that a given cipher is resistant against those attacks is notoriously difficult. In this p...

    Phil Hebborn, Baptiste Lambin, Gregor Leander in Advances in Cryptology – ASIACRYPT 2021 (2021)

  9. Chapter and Conference Paper

    Lower Bounds on the Degree of Block Ciphers

    Only the method to estimate the upper bound of the algebraic degree on block ciphers is known so far, but it is not useful for the designer to guarantee the security. In this paper we provide meaningful lower...

    Phil Hebborn, Baptiste Lambin, Gregor Leander in Advances in Cryptology – ASIACRYPT 2020 (2020)

  10. Chapter and Conference Paper

    Modeling for Three-Subset Division Property Without Unknown Subset

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application to stream ciphers,...

    Yonglin Hao, Gregor Leander, Willi Meier in Advances in Cryptology – EUROCRYPT 2020 (2020)

  11. Chapter and Conference Paper

    Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems

    The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been develop...

    Tim Beyne, Anne Canteaut, Itai Dinur in Advances in Cryptology – CRYPTO 2020 (2020)

  12. Chapter and Conference Paper

    Improved Differential-Linear Attacks with Applications to ARX Ciphers

    We present several improvements to the framework of differential-linear attacks with a special focus on ARX ciphers. As a demonstration of their impact, we apply them to Chaskey and ChaCha and we are able to s...

    Christof Beierle, Gregor Leander, Yosuke Todo in Advances in Cryptology – CRYPTO 2020 (2020)

  13. Chapter and Conference Paper

    Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints

    Cryptanalysis with SAT/SMT, MILP and CP has increased in popularity among symmetric-key cryptanalysts and designers due to its high degree of automation. So far, this approach covers differential, linear, impo...

    Dan** Shi, Siwei Sun, Patrick Derbez in Advances in Cryptology – ASIACRYPT 2018 (2018)

  14. No Access

    Chapter and Conference Paper

    Several MILP-Aided Attacks Against SNOW 2.0

    SNOW 2.0 is a software-oriented stream cipher and internationally standardized by ISO/IEC 18033-4. In this paper, we present three attacks on SNOW 2.0 by MILP-aided automatic search algorithms. First, we prese...

    Yuki Funabiki, Yosuke Todo, Takanori Isobe in Cryptology and Network Security (2018)

  15. No Access

    Chapter and Conference Paper

    Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree

    We proposed the division property, which is a new method to find integral characteristics, at EUROCRYPT2015. Then, we applied this technique to analyze the full MISTY1 at CRYPTO2015. After the proposal of the ...

    Yosuke Todo in Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology (2017)

  16. Chapter and Conference Paper

    Gimli : A Cross-Platform Permutation

    This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64-bit and 32-bit ARM smartphone...

    Daniel J. Bernstein, Stefan Kölbl in Cryptographic Hardware and Embedded System… (2017)

  17. Chapter and Conference Paper

    Cube Attacks on Non-Blackbox Polynomials Based on Division Property

    The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack, the cube attac...

    Yosuke Todo, Takanori Isobe, Yonglin Hao in Advances in Cryptology – CRYPTO 2017 (2017)

  18. No Access

    Chapter and Conference Paper

    Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials

    The current paper analyzes the key schedule function of lightweight block cipher Simon, which was designed by NSA in 2013. In particular, a list of all iterative key differences is provided for all members of the...

    Kota Kondo, Yu Sasaki, Yosuke Todo in Advances in Information and Computer Secur… (2017)

  19. Chapter and Conference Paper

    GIFT: A Small Present

    In this article, we revisit the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its lim...

    Subhadeep Banik, Sumit Kumar Pandey in Cryptographic Hardware and Embedded System… (2017)

  20. No Access

    Chapter and Conference Paper

    Compact Representation for Division Property

    The division property, which is a new method to find integral characteristics, was proposed at Eurocrypt 2015. Thereafter, some applications and improvements have been proposed. The bit-based division property...

    Yosuke Todo, Masakatu Morii in Cryptology and Network Security (2016)

previous disabled Page of 2