CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …
implementation of cryptographic primitives after the algorithms have been designed for …
Boomerang connectivity table: A new cryptanalysis tool
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …
[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
Finding the impossible: Automated search for full impossible-differential, zero-correlation, and integral attacks
Abstract Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of
important attacks on block ciphers. For example, the impossible differential attack was the …
important attacks on block ciphers. For example, the impossible differential attack was the …
Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis
Resistance against differential cryptanalysis is an important design criteria for any modern
block cipher and most designs rely on finding some upper bound on probability of single …
block cipher and most designs rely on finding some upper bound on probability of single …
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
Forkcipher: a new primitive for authenticated encryption of very short messages
Highly efficient encryption and authentication of short messages is an essential requirement
for enabling security in constrained scenarios such as the CAN FD in automotive systems …
for enabling security in constrained scenarios such as the CAN FD in automotive systems …
Improved rectangle attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …
Analysis of AES, SKINNY, and others with constraint programming
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis.
In this work, we employ the constraint programming (CP) technique to tackle such problems …
In this work, we employ the constraint programming (CP) technique to tackle such problems …
Catching the fastest boomerangs: Application to SKINNY
In this paper we describe a new tool to search for boomerang distinguishers. One limitation
of the MILP model of Liu et al. is that it handles only one round for the middle part while …
of the MILP model of Liu et al. is that it handles only one round for the middle part while …