Truncated Boomerang Attacks and Application to AES-Based Ciphers

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:EUROCRYPT (42. : 2023 : Lyon) Advances in cryptology - EUROCRYPT 2023 ; Part 4
1. Verfasser: Bariant, Augustin (VerfasserIn)
Weitere Verfasser: Leurent, Gaëtan (VerfasserIn)
Pages:2023
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Better Steady than Speedy: Full Break of SPEEDY-7-192 2023 Boura, Christina
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY 2023 Shi, Danping
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls 2023 Guo, Chun
Pitfalls and Shortcomings for Decompositions and Alignment 2023 Lambin, Baptiste
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions 2023 Freitag, Cody
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation 2023 Dinur, Itai
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing 2023 Qin, Lingyue
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP 2023 Liu, Fukang
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications 2023 Grassi, Lorenzo
Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers 2023 Masure, Loïc
Improved Power Analysis Attacks on Falcon 2023 Zhang, Shiduo
One-Hot Conversion: Towards Faster Table-Based A2B Conversion 2023 D’Anvers, Jan-Pieter
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks 2023 Hadipour, Hosein
Coefficient Grouping: Breaking Chaghri and More 2023 Liu, Fukang
Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics 2023 Gilbert, Henri
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More 2023 Menda, Sanketh
Proof of Mirror Theory for a Wide Range of ξmax 2023 Cogliati, Benoît
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation 2023 Bao, Zhenzhen
Truncated Boomerang Attacks and Application to AES-Based Ciphers 2023 Bariant, Augustin
Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials 2023 Zhang, Zhongyi
Alle Artikel auflisten