Publication | Date of Publication | Type |
---|
Secret can be public: low-memory AEAD mode for high-order masking | 2023-06-30 | Paper |
Double-block-length hash function for minimum memory size | 2023-05-12 | Paper |
\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher | 2023-05-12 | Paper |
A card-minimal three-input and protocol using two shuffles | 2023-03-30 | Paper |
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications | 2022-12-09 | Paper |
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
Rate-one AE with security under RUP | 2022-11-02 | Paper |
Quantum collision attacks on reduced SHA-256 and SHA-512 | 2022-03-31 | Paper |
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound | 2022-03-23 | Paper |
Lightweight authenticated encryption mode suitable for threshold implementation | 2022-03-23 | Paper |
On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition | 2021-02-23 | Paper |
Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode | 2021-02-23 | Paper |
Quantum algorithm for the multicollision problem | 2020-10-12 | Paper |
GIFT: A Small Present | 2020-06-24 | Paper |
A practical forgery attack on Lilliput-AE | 2020-06-15 | Paper |
Related-key boomerang attacks on GIFT with automated trail search including BCT effect | 2020-05-27 | Paper |
Quantum attacks without superposition queries: the offline Simon's algorithm | 2020-05-20 | Paper |
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS | 2020-03-09 | Paper |
Improved quantum multicollision-finding algorithm | 2020-02-25 | Paper |
Cryptanalysis of ForkAES | 2020-01-30 | Paper |
Universal forgery and multiple forgeries of MergeMAC and generalized constructions | 2020-01-28 | Paper |
Quantum chosen-ciphertext attacks against Feistel ciphers | 2020-01-28 | Paper |
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations | 2020-01-21 | Paper |
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 | 2019-11-27 | Paper |
Beyond conventional security in sponge-based authenticated encryption modes | 2019-08-13 | Paper |
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes | 2019-02-20 | Paper |
Cryptanalysis of MORUS | 2019-01-23 | Paper |
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT | 2018-10-24 | Paper |
Analyzing key schedule of \textsc{Simon}: iterative key differences and application to related-key impossible differentials | 2018-10-24 | Paper |
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions | 2018-10-17 | Paper |
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput | 2018-09-14 | Paper |
Related-key boomerang attacks on full ANU lightweight block cipher | 2018-08-10 | Paper |
Improved related-tweakey boomerang attacks on Deoxys-BC | 2018-07-17 | Paper |
Boomerang Connectivity Table: a new cryptanalysis tool | 2018-07-09 | Paper |
Cryptanalysis of Reduced NORX | 2018-05-09 | Paper |
Quantum multicollision-finding algorithm | 2018-03-08 | Paper |
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network | 2018-02-16 | Paper |
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects | 2017-06-23 | Paper |
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem | 2017-02-01 | Paper |
Nonlinear Invariant Attack | 2017-01-06 | Paper |
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS | 2016-10-27 | Paper |
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants | 2016-10-04 | Paper |
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ | 2016-09-02 | Paper |
Extended meet-in-the-middle attacks on some Feistel constructions | 2016-07-21 | Paper |
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data | 2016-05-19 | Paper |
Analysis of the CAESAR Candidate Silver | 2016-05-19 | Paper |
Practical Cryptanalysis of PAES | 2016-04-13 | Paper |
Refinements of the k-tree Algorithm for the Generalized Birthday Problem | 2016-03-23 | Paper |
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption | 2016-03-02 | Paper |
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers | 2015-12-04 | Paper |
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs | 2015-10-16 | Paper |
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 | 2015-10-01 | Paper |
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds | 2015-09-18 | Paper |
Cryptanalysis of Reduced-Round SIMON32 and SIMON48 | 2015-09-10 | Paper |
Message Extension Attack against Authenticated Encryptions: Application to PANDA | 2015-02-10 | Paper |
Meet-in-the-Middle Attacks on Generic Feistel Constructions | 2015-01-16 | Paper |
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks | 2014-10-14 | Paper |
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC | 2014-09-15 | Paper |
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA | 2014-09-15 | Paper |
How to Construct Sufficient Conditions for Hash Functions | 2014-08-21 | Paper |
Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds | 2014-08-20 | Paper |
Updates on Generic Attacks against HMAC and NMAC | 2014-08-07 | Paper |
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications | 2014-07-07 | Paper |
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl | 2014-03-28 | Paper |
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist | 2014-01-24 | Paper |
Cryptanalysis of HMAC/NMAC-Whirlpool | 2013-12-10 | Paper |
Limited-Birthday Distinguishers for Hash Functions | 2013-12-10 | Paper |
Related-Key Boomerang Attacks on KATAN32/48/64 | 2013-06-28 | Paper |
Comprehensive Study of Integral Analysis on 22-Round LBlock | 2013-06-04 | Paper |
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties | 2013-06-04 | Paper |
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher | 2013-06-04 | Paper |
Boomerang Distinguishers for Full HAS-160 Compression Function | 2013-04-04 | Paper |
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function | 2013-04-04 | Paper |
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks | 2013-03-19 | Paper |
Generic Related-Key Attacks for HMAC | 2013-03-19 | Paper |
Improved Integral Analysis on Tweaked Lesamnta | 2012-11-01 | Paper |
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia | 2012-09-07 | Paper |
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward | 2012-08-17 | Paper |
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA | 2012-07-23 | Paper |
New Truncated Differential Cryptanalysis on 3D Block Cipher | 2012-06-29 | Paper |
Cryptanalyses on a Merkle-Damgård Based MAC — Almost Universal Forgery and Distinguishing-H Attacks | 2012-06-29 | Paper |
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL | 2012-06-08 | Paper |
Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity | 2011-11-10 | Paper |
Preimage Attacks against PKC98-Hash and HAS-V | 2011-10-27 | Paper |
Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160 | 2011-07-29 | Paper |
Preimage Attacks on Full-ARIRANG (Poster) | 2011-07-07 | Paper |
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool | 2011-07-07 | Paper |
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes | 2011-07-07 | Paper |
Collisions of MMO-MD5 and Their Impact on Original MD5 | 2011-06-29 | Paper |
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach | 2011-02-11 | Paper |
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl | 2010-12-07 | Paper |
Finding Preimages of Tiger Up to 23 Steps | 2010-07-13 | Paper |
Rebound Attack on the Full Lane Compression Function | 2009-12-15 | Paper |
Preimages for Step-Reduced SHA-2 | 2009-12-15 | Paper |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function | 2009-12-09 | Paper |
Preimage Attacks on One-Block MD4, 63-Step MD5 and More | 2009-11-03 | Paper |
Bit-Free Collision: Application to APOP Attack | 2009-10-28 | Paper |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 | 2009-10-20 | Paper |
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL | 2009-09-29 | Paper |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others | 2009-06-25 | Paper |
Finding Preimages in Full MD5 Faster Than Exhaustive Search | 2009-05-12 | Paper |
A New Strategy for Finding a Differential Path of SHA-1 | 2009-03-06 | Paper |
Preimage Attacks on 3, 4, and 5-Pass HAVAL | 2009-02-10 | Paper |
New Message Difference for MD4 | 2008-09-16 | Paper |
Preimage Attacks on Step-Reduced MD5 | 2008-07-08 | Paper |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function | 2008-06-13 | Paper |
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack | 2008-04-24 | Paper |
Improved Collision Search for SHA-0 | 2008-04-24 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |