We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 241 results
  1. On the Security of Keyed Hashing Based on Public Permutations

    Doubly-extendable cryptographic keyed functions (deck) generalize the concept of message authentication codes (MAC) and stream ciphers in that they...
    Jonathan Fuchs, Yann Rotella, Joan Daemen in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  2. The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation

    We prove the tight multi-user (mu) security of the (tweakable) key alternating cipher (KAC) for any round r with a single permutation and r-wise...
    Yusuke Naito, Yu Sasaki, Takeshi Sugawara in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  3. Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis

    The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis....
    Huiqin Chen, Yongqiang Li, ... Mingsheng Wang in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  4. On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC

    Recent practical applications using advanced cryptographic protocols such as multi-party computations (MPC) and zero-knowledge proofs (ZKP) have...
    Jiamin Cui, Kai Hu, ... Puwen Wei in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  5. Randomized Half-Ideal Cipher on Groups with Applications to UC (a)PAKE

    An Ideal Cipher (IC) is a cipher where each key defines a random permutation on the domain. Ideal Cipher on a group has many attractive...
    Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  6. Twin Column Parity Mixers and Gaston

    We introduce a new type of mixing layer for the round function of cryptographic permutations, called circulant twin column parity mixer (CPM), that...
    Solane El Hirch, Joan Daemen, ... Rusydi H. Makarim in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  7. Quantum Attacks Without Superposition Queries: The Offline Simon’s Algorithm

    In symmetric cryptanalysis, the model of superposition queries has led to surprising results, with many constructions being broken in polynomial...
    Xavier Bonnetain, Akinori Hosoyamada, ... André Schrottenloher in Advances in Cryptology – ASIACRYPT 2019
    Conference paper 2019
  8. Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient

    We prove that the 5-round iterated Even-Mansour (IEM) construction with a non-idealized key-schedule (such as the trivial key-schedule, where all...
    Yuanxi Dai, Yannick Seurin, ... Aishwarya Thiruvengadam in Advances in Cryptology – CRYPTO 2017
    Conference paper 2017
  9. Multi-scale iterative domain adaptation for specific emitter identification

    Specific emitter identification (SEI) is a technology that identifies different emitters through their unique characteristics. Research on...

    Jiaxu Liu, Jiao Wang, ... Jianqing Li in Applied Intelligence
    Article 01 April 2024
  10. Rotational Cryptanalysis on MAC Algorithm Chaskey

    In this paper we generalize the Markov theory with respect to a relation between two plaintexts and not their difference and apply it for rotational...
    Liliya Kraleva, Tomer Ashur, Vincent Rijmen in Applied Cryptography and Network Security
    Conference paper 2020
  11. Partition and mix: generalizing the swap-or-not shuffle

    Card shuffle algorithms have been studied from a cryptographic point of view with applications to format preserving encryption. In this work, we...

    Nam-Su Jho, Jooyoung Lee in Designs, Codes and Cryptography
    Article 02 March 2023
  12. New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers

    We propose new key recovery attacks on the two minimal two-round n-bit Even-Mansour ciphers that are secure up to...
    Takanori Isobe, Kyoji Shibutani in Advances in Cryptology – ASIACRYPT 2017
    Conference paper 2017
  13. Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles

    The Feistel-2 (a.k.a, Feistel-KF) structure is a variant of the Feistel structure such that the i-th round function is given by...
    Takanori Daiza, Kazuki Yoneyama in Advances in Information and Computer Security
    Conference paper 2022
  14. Forgery Attacks on FlexAE and FlexAEAD

    is one of the round-1 candidates in the ongoing NIST Lightweight Cryptography standardization project and an evolution of the previously...
    Maria Eichlseder, Daniel Kales, Markus Schofnegger in Cryptography and Coding
    Conference paper 2019
  15. The Key-Dependent Message Security of Key-Alternating Feistel Ciphers

    Key-Alternating Feistel (KAF) ciphers are a popular variant of Feistel ciphers whereby the round functions are defined as...
    Pooya Farshim, Louiza Khati, ... Damien Vergnaud in Topics in Cryptology – CT-RSA 2021
    Conference paper 2021
  16. WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction

    White-box cryptosystems aim at providing security against an adversary that has access to the encryption process. As a countermeasure against code...
    Jihoon Cho, Kyu Young Choi, ... Aviya Veidberg in Topics in Cryptology – CT-RSA 2017
    Conference paper 2017
  17. Quantum attacks on some feistel block ciphers

    Post-quantum cryptography has attracted much attention from worldwide cryptologists. However, most research works are related to public-key...

    **aoyang Dong, Bingyou Dong, **aoyun Wang in Designs, Codes and Cryptography
    Article 09 March 2020
  18. BBB Secure Nonce Based MAC Using Public Permutations

    In the recent trend of CAESAR competition and NIST light-weight competition, cryptographic community have witnessed the submissions of several...
    Avijit Dutta, Mridul Nandi in Progress in Cryptology - AFRICACRYPT 2020
    Conference paper 2020
  19. Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation

    A central problem in cryptanalysis is to find all the significant deviations from randomness in a given n-bit cryptographic primitive. When n is...
    Itai Dinur, Orr Dunkelman, ... Adi Shamir in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  20. Sequential Indifferentiability of Confusion-Diffusion Networks

    A large proportion of modern symmetric cryptographic building blocks are designed using the Substitution-Permutation Networks (SPNs), or more...
    Qi Da, Shanjie Xu, Chun Guo in Progress in Cryptology – INDOCRYPT 2021
    Conference paper 2021
Did you find what you were looking for? Share feedback.