Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

Survey on recent trends towards generalized differential and boomerang uniformities

S Mesnager, B Mandal, M Msahli - Cryptography and Communications, 2022 - Springer
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and
stream ciphers and cryptographic hash functions. The discovery of differential cryptanalysis …

DLCT: a new tool for differential-linear cryptanalysis

A Bar-On, O Dunkelman, N Keller… - Advances in Cryptology …, 2019 - Springer
Differential cryptanalysis and linear cryptanalysis are the two best-known techniques for
cryptanalysis of block ciphers. In 1994, Langford and Hellman introduced the differential …

On the boomerang uniformity of cryptographic sboxes

C Boura, A Canteaut - IACR Transactions on Symmetric …, 2018 - icscm.ub.rub.de
The boomerang attack is a cryptanalysis technique against block ciphers which combines
two differentials for the upper part and the lower part of the cipher. The dependency between …

[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms

VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …

The QARMAv2 family of tweakable block ciphers

R Avanzi, S Banik, O Dunkelman… - Cryptology ePrint …, 2023 - eprint.iacr.org
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while kee** …

The Deoxys AEAD Family

J Jean, I Nikolić, T Peyrin, Y Seurin - Journal of Cryptology, 2021 - Springer
We present the Deoxys family of authenticated encryption schemes, which consists of
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …

Gleeok: A family of low-latency prfs and its applications to authenticated encryption

R Anand, S Banik, A Caforio, T Ishikawa… - IACR Transactions on …, 2024 - tosc.iacr.org
In this paper, we propose a new family of low-latency pseudorandom functions (PRFs),
dubbed Gleeok. Gleeok utilizes three 128-bit branches to achieve a 256-bit key size while …

New results about the boomerang uniformity of permutation polynomials

K Li, L Qu, B Sun, C Li - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of
S-boxes: boomerang connectivity table (BCT for short) for evaluating the subtleties of …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …