Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

A Biryukov, V Velichkov, Y Le Corre - Fast Software Encryption: 23rd …, 2016 - Springer
We propose the first adaptation of Matsui's algorithm for finding the best differential and
linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy …

Analysis of AES, SKINNY, and others with constraint programming

S Sun, D Gerault, P Lafourcade, Q Yang… - IACR transactions on …, 2017 - hal.science
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis.
In this work, we employ the constraint programming (CP) technique to tackle such problems …

CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives

E Bellini, D Gerault, J Grados, YJ Huang… - … Conference on Selected …, 2023 - Springer
This paper introduces claasp, a Cryptographic Library for the Automated Analysis of
Symmetric Primitives. The library is designed to be modular, extendable, easy to use …

Programming the Demirci-Selçuk meet-in-the-middle attack with constraints

D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu - … Conference on the Theory …, 2018 - Springer
Abstract Cryptanalysis with SAT/SMT, MILP and CP has increased in popularity among
symmetric-key cryptanalysts and designers due to its high degree of automation. So far, this …

Exploring differential-based distinguishers and forgeries for ASCON

D Gérault, T Peyrin, QQ Tan - IACR Transactions on …, 2021 - ojs.ub.ruhr-uni-bochum.de
Automated methods have become crucial components when searching for distinguishers
against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the …

[Књига][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Misuse-free key-recovery and distinguishing attacks on 7-round Ascon

R Rohit, K Hu, S Sarkar, S Sun - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Being one of the winning algorithms of the CAESAR competition and currently a second
round candidate of the NIST lightweight cryptography standardization project, the …

Towards tight differential bounds of Ascon: a hybrid usage of SMT and MILP

RH Makarim, R Rohit - IACR Transactions on Symmetric Cryptology, 2022 - bmt.ub.rub.de
Being one of the winners of the CAESAR competition and a finalist of the ongoing NIST
lightweight cryptography competition, the authenticated encryption with associated data …