Better Steady than Speedy: Full Break of SPEEDY-7-192
|
2023 |
Boura, Christina |
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY
|
2023 |
Shi, Danping |
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls
|
2023 |
Guo, Chun |
Pitfalls and Shortcomings for Decompositions and Alignment
|
2023 |
Lambin, Baptiste |
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
|
2023 |
Freitag, Cody |
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation
|
2023 |
Dinur, Itai |
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing
|
2023 |
Qin, Lingyue |
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
|
2023 |
Liu, Fukang |
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications
|
2023 |
Grassi, Lorenzo |
Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers
|
2023 |
Masure, Loïc |
Improved Power Analysis Attacks on Falcon
|
2023 |
Zhang, Shiduo |
One-Hot Conversion: Towards Faster Table-Based A2B Conversion
|
2023 |
D’Anvers, Jan-Pieter |
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
|
2023 |
Hadipour, Hosein |
Coefficient Grouping: Breaking Chaghri and More
|
2023 |
Liu, Fukang |
Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics
|
2023 |
Gilbert, Henri |
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More
|
2023 |
Menda, Sanketh |
Proof of Mirror Theory for a Wide Range of ξmax
|
2023 |
Cogliati, Benoît |
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation
|
2023 |
Bao, Zhenzhen |
Truncated Boomerang Attacks and Application to AES-Based Ciphers
|
2023 |
Bariant, Augustin |
Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials
|
2023 |
Zhang, Zhongyi |