Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
Survey on recent trends towards generalized differential and boomerang uniformities
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and
stream ciphers and cryptographic hash functions. The discovery of differential cryptanalysis …
stream ciphers and cryptographic hash functions. The discovery of differential cryptanalysis …
DLCT: a new tool for differential-linear cryptanalysis
A Bar-On, O Dunkelman, N Keller… - Advances in Cryptology …, 2019 - Springer
Differential cryptanalysis and linear cryptanalysis are the two best-known techniques for
cryptanalysis of block ciphers. In 1994, Langford and Hellman introduced the differential …
cryptanalysis of block ciphers. In 1994, Langford and Hellman introduced the differential …
On the boomerang uniformity of cryptographic sboxes
C Boura, A Canteaut - IACR Transactions on Symmetric …, 2018 - icscm.ub.rub.de
The boomerang attack is a cryptanalysis technique against block ciphers which combines
two differentials for the upper part and the lower part of the cipher. The dependency between …
two differentials for the upper part and the lower part of the cipher. The dependency between …
[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms
VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
The QARMAv2 family of tweakable block ciphers
R Avanzi, S Banik, O Dunkelman… - Cryptology ePrint …, 2023 - eprint.iacr.org
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while kee** …
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while kee** …
The Deoxys AEAD Family
We present the Deoxys family of authenticated encryption schemes, which consists of
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …
Gleeok: A family of low-latency prfs and its applications to authenticated encryption
R Anand, S Banik, A Caforio, T Ishikawa… - IACR Transactions on …, 2024 - tosc.iacr.org
In this paper, we propose a new family of low-latency pseudorandom functions (PRFs),
dubbed Gleeok. Gleeok utilizes three 128-bit branches to achieve a 256-bit key size while …
dubbed Gleeok. Gleeok utilizes three 128-bit branches to achieve a 256-bit key size while …
New results about the boomerang uniformity of permutation polynomials
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of
S-boxes: boomerang connectivity table (BCT for short) for evaluating the subtleties of …
S-boxes: boomerang connectivity table (BCT for short) for evaluating the subtleties of …
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
find the right quartets which may suggest key candidates have to satisfy some nonlinear …