The QARMA block cipher family. Almost MDS matrices over rings with zero divisors, nearly symmetric even-mansour constructions with non-involutory central rounds …

R Avanzi - IACR Transactions on Symmetric Cryptology, 2017 - tosc.iacr.org
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted
at applications such as memory encryption, the generation of very short tags for hardware …

Efficient MILP modelings for sboxes and linear layers of SPN ciphers

C Boura, D Coggia - IACR Transactions on Symmetric Cryptology, 2020 - inria.hal.science
Mixed Integer Linear Programming (MILP) solvers are regularly used by designers for
providing security arguments and by cryptanalysts for searching for new distinguishers. For …

A new structural-differential property of 5-round AES

L Grassi, C Rechberger, S Rønjom - … on the Theory and Applications of …, 2017 - Springer
AES is probably the most widely studied and used block cipher. Also versions with a
reduced number of rounds are used as a building block in many cryptographic schemes, eg …

New insights on AES-like SPN ciphers

B Sun, M Liu, J Guo, L Qu, V Rijmen - Annual International Cryptology …, 2016 - Springer
It has been proved in Eurocrypt 2016 by Sun et al. that if the details of the S-boxes are not
exploited, an impossible differential and a zero-correlation linear hull can extend over at …

Congruent differential cluster for binary SPN ciphers

T Cui, Y Mao, Y Yang, Y Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This study is focused on the differential clustering effect of the SPN block cipher, which
employs a binary matrix as its diffusion layer. We present a novel strategy for differential …

TNT: how to tweak a block cipher

Z Bao, C Guo, J Guo, L Song - … International Conference on the Theory and …, 2020 - Springer
In this paper, we propose Tweak-aNd-Tweak (TNT TNT for short) mode, which builds a
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …

Finding all impossible differentials when considering the DDT

K Hu, T Peyrin, M Wang - International Conference on Selected Areas in …, 2022 - Springer
Impossible differential (ID) cryptanalysis is one of the most important attacks on block
ciphers. The Mixed Integer Linear Programming (MILP) model is a popular method to …

Searching for subspace trails and truncated differentials

G Leander, C Tezcan, F Wiemer - 2018 - open.metu.edu.tr
Grassi et al.[Gra+ 16] introduced subspace trail cryptanalysis as a generalization of invariant
subspaces and used it to give the first five round distinguisher for Aes. While it is a generic …

Impossible differential cryptanalysis and a security evaluation framework for AND-RX ciphers

K Zhang, S Wang, X Lai, L Wang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In this paper, a security evaluation framework for AND-RX ciphers against impossible
differential cryptanalysis is proposed. This framework is constructed based on three different …

Feistel-like structures revisited: classification and cryptanalysis

B Sun, Z **ang, Z Dai, G Liu, X Shen, L Qu… - Annual International …, 2024 - Springer
In 2023, Liu et al. summarized the Feistel-like structures which use a single round function,
and proposed a unified form of these structures which is named the unified structure. This …