Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
暂无分享,去创建一个
Siwei Sun | Chao Li | Yunwen Liu | Siwei Sun | Chao Li | Yunwen Liu
[1] Jing Zhang,et al. Differential-Multiple Linear Cryptanalysis , 2009, Inscrypt.
[2] Ivica Nikolic,et al. Rotational Cryptanalysis of ARX , 2010, FSE.
[3] Serge Vaudenay,et al. Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.
[4] Gregor Leander,et al. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack , 2011, CRYPTO.
[5] Emanuele Bellini,et al. Rotational analysis of ChaCha permutation , 2020, IACR Cryptol. ePrint Arch..
[6] Ron Steinfeld,et al. Rotational Cryptanalysis of ARX Revisited , 2015, FSE.
[7] Tao Huang,et al. Boomerang Connectivity Table: A New Cryptanalysis Tool , 2018, IACR Cryptol. ePrint Arch..
[8] Yosuke Todo,et al. Improved Differential-Linear Attacks with Applications to ARX Ciphers , 2020, Journal of Cryptology.
[9] Susan K. Langford,et al. Differential-Linear Cryptanalysis , 1994, CRYPTO.
[10] Gregor Leander,et al. Differential-Linear Cryptanalysis Revisited , 2016, Journal of Cryptology.
[11] Yunwen Liu,et al. Rotational Cryptanalysis in the Presence of Constants , 2016, IACR Trans. Symmetric Cryptol..
[12] Ivica Nikolic,et al. Rotational Rebound Attacks on Reduced Skein , 2010, Journal of Cryptology.
[13] Alex Biryukov,et al. Design Strategies for ARX with Provable Bounds: Sparx and LAX , 2016, ASIACRYPT.
[14] Gregor Leander,et al. Differential-Linear Cryptanalysis Revisited , 2014, FSE.
[15] Vincent Rijmen,et al. Rotational Cryptanalysis on MAC Algorithm Chaskey , 2020, IACR Cryptol. ePrint Arch..
[16] Jiqiang Lu. A methodology for differential-linear cryptanalysis and its applications , 2015, Des. Codes Cryptogr..
[17] Yosuke Todo,et al. Structural Evaluation by Generalized Integral Property , 2015, EUROCRYPT.
[18] Yunwen Liu,et al. Rotational-XOR Cryptanalysis of Simon-like Block Ciphers , 2020, IACR Cryptol. ePrint Arch..
[19] Kostas Papagiannopoulos,et al. Friet: An Authenticated Encryption Scheme with Built-in Fault Detection , 2020, IACR Cryptol. ePrint Arch..
[20] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[21] Jakub Töpfer. Links Between Differential and Linear Cryptanalysis , 2015 .
[22] Orr Dunkelman,et al. DLCT: A New Tool for Differential-Linear Cryptanalysis , 2019, IACR Cryptol. ePrint Arch..
[23] Joan Daemen,et al. The design of Xoodoo and Xoofff , 2018, IACR Trans. Symmetric Cryptol..
[24] Yosuke Todo,et al. Bit-Based Division Property and Application to Simon Family , 2016, FSE.
[25] Jean-Philippe Aumasson,et al. SipHash: A Fast Short-Input PRF , 2012, INDOCRYPT.
[26] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[27] Tyge Tiessen,et al. Polytopic Cryptanalysis , 2016, EUROCRYPT.
[28] Guido Bertoni,et al. Farfalle: parallel permutation-based cryptography , 2017, IACR Trans. Symmetric Cryptol..
[29] Luan Cardoso dos Santos,et al. Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX) , 2020, CRYPTO.
[30] Claude Carlet,et al. Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.
[31] Yu Sasaki,et al. Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64 , 2016, Journal of Cryptology.
[32] Hongbo Yu,et al. Cryptanalysis of Reduced-Round SipHash , 2023, IACR Cryptol. ePrint Arch..
[33] Stefan Kölbl,et al. Observations on the SIMON Block Cipher Family , 2015, CRYPTO.
[34] Samuel Neves,et al. Analysis of NORX: Investigating Differential and Rotational Properties , 2014, LATINCRYPT.
[35] Brice Minaud,et al. A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro , 2015, EUROCRYPT.
[36] Yunwen Liu,et al. Rotational-XOR Cryptanalysis of Reduced-round SPECK , 2017, IACR Cryptol. ePrint Arch..
[37] Marian Srebrny,et al. Rotational Cryptanalysis of Round-Reduced Keccak , 2013, FSE.