scientific article

From MaRDI portal
Publication:2760977

zbMath1065.94005MaRDI QIDQ2760977

Vincent Rijmen, Joan Daemen

Publication date: 17 December 2001

Full work available at URL: http://link.springer.com/978-3-662-04722-4

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Very Compact Hardware Implementations of the Blockcipher CLEFIANimix:An involutary nonlinear vectorial boolean functionApplications of design theory for the constructions of MDS matrices for lightweight cryptographyFeistel-inspired scrambling improves the quality of linear congruential generatorsSecurity evaluation of MISTY structure with SPN round functionMeet-in-the-middle attacks on 10-round AES-256LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communicationConstructions of S-boxes with uniform sharingAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreFormat Preserving Sets: On Diffusion Layers of Format Preserving Encryption SchemesWhirlwind: a new cryptographic hash functionOn the symmetric properties of APN functionsGeneral Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block CipherCryptanalysis of Reduced-Round WhirlwindImproving the Biclique Cryptanalysis of AESPreventing Fault Attacks Using Fault Randomization with a Case Study on AESAn efficient signcryption for data access control in cloud computingSide-channel cryptographic attacks using pseudo-Boolean optimizationSecure chaotic communication based on extreme multistabilityOn the construction of differentially 4-uniform involutionsDifferential-linear cryptanalysis revisitedBicliques with Minimal Data and Time Complexity for AESConnecting tweakable and multi-key blockcipher securityLinear Cryptanalysis of the PP-1 and PP-2 Block CiphersEfficient slide attacksBlock Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded ApplicationsOn the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2Security Analysis of PRINCETowards Understanding the Known-Key Security of Block CiphersHigher-Order Side Channel Security and Mask RefreshingExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESA Framework for Automated Independent-Biclique CryptanalysisAES Smaller Than S-BoxDifferential Attacks Against SPN: A Thorough AnalysisCodes over $\mathcal{L}(GF(2)^m,GF(2)^m)$, MDS Diffusion Matrices and Cryptographic ApplicationsType-preserving matrices and security of block ciphersChaos based efficient selective image encryptionOn algebraic immunity of trace inverse functions on finite fields of characteristic twoConstructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\)Simpira v2: A Family of Efficient Permutations Using the AES Round FunctionEfficient and Provable White-Box PrimitivesUniversal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption AlgorithmHow to Build Fully Secure Tweakable Blockciphers from Classical BlockciphersDesign Strategies for ARX with Provable Bounds: Sparx and LAXA novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric groupCompositions and parities of complete mappings and of orthomorphismsCritique of the related-key attack conceptOn unbalanced feistel networks with contracting MDS diffusionMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionTight security analysis of 3-round key-alternating cipher with a single permutationQuantum collision attacks on AES-like hashing with low quantum random access memoriesPermutation polynomials with low differential uniformity over finite fields of odd characteristicMore constructions of \(n\)-cycle permutationsImpossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BCWeak Keys for AEZ, and the External Key Padding AttackInternal differential collision attacks on the reduced-round Grøstl-0 hash functionLinear hulls with correlation zero and linear cryptanalysis of block ciphersLiterature survey on nonlinear components and chaotic nonlinear components of block ciphersCryptographic properties of modified AES-like S-boxesImpossible Differentials of SPN CiphersOn computational complexity of impossible differential cryptanalysisCommitting to Quantum Resistance, Better: A Speed-and-Risk-Configurable Defence for Bitcoin Against a Fast Quantum Computing AttackAlgebraic Attacks on the Courtois Toy CipherLBlock: A Lightweight Block CipherAnalysis of Reduced-SHAvite-3-256 v2Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolAffine equivalence in the AES round functionMulti-objective optimisation of bijective S-boxesOn some probabilistic approximations for AES-like S-boxesDesigning against a class of algebraic attacks on symmetric block ciphersHigher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONPragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AESRevisiting key schedule's diffusion in relation with round function's diffusionWhat is the Future of Cryptography?Bitsliced High-Performance AES-ECB on GPUsImproved single-key attacks on 8-round AES-192 and AES-256Cryptanalysis of Feistel Networks with Secret Round FunctionsImproved Meet-in-the-Middle Distinguisher on Feistel SchemesExploring Energy Efficiency of Lightweight Block CiphersDifferential Forgery Attack Against LACConstructing Lightweight Optimal Diffusion Primitives with Feistel StructureScope: On the Side Channel Vulnerability of Releasing Unverified PlaintextsAnalysis of the CAESAR Candidate SilverThe Differential Analysis of S-FunctionsImplementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID TagsTweaking AESOn the Diffusion of Generalized Feistel Structures Regarding Differential and Linear CryptanalysisAffine Masking against Higher-Order Side Channel AnalysisSubspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash FunctionImproved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQWide Trail Design Strategy for Binary MixColumnsSquare Attack on 7-Round Kiasu-BCCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeExperimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack ComplexityCryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN ProblemChaotic Image Encryption of Regions of InterestMars Attacks! Revisited:New Insights on AES-Like SPN CiphersLinear and differential cryptanalysis of reduced-round AESReversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesInvestigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroupsInvolutory-multiple-lightweight MDS matrices based on Cauchy-type matricesA framework to optimize implementations of matricesNon-monomial permutations with differential uniformity sixOn the resilience of Even-Mansour to invariant permutationsOn hidden sums compatible with a given block cipher diffusion layerWeak-key distinguishers for AESImproved (related-key) differential cryptanalysis on GIFTOn modes of operations of a block cipher for authentication and authenticated encryptionSeparating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-MansourOn some block ciphers and imprimitive groupsCharacterization of almost perfect nonlinear functions in terms of subfunctionsA dynamic prime number based efficient security mechanism for big sensing data streamsDouble image multi-encryption algorithm based on fractional chaotic time seriesOn the complexity of parallel algorithms for computing inverses in \(\text{GF}(2^m)\) with \(m\) primeUpper bound of the length of truncated impossible differentials for AESNew secure partial encryption method for medical images using graph coloring problemOn cross-correlation indicators of an S-boxSecurity-aware optimization for ubiquitous computing systems with SEAT graph approachBent and permutational properties of Budaghyan-Carlet hexanomialsNew statistical randomness tests based on length of runsNew field of cryptography: DNA cryptographyColor image encryption based on one-time keys and robust chaotic mapsDES with any reduced masked rounds is not secure against side-channel attacksStructural cryptanalysis of SASASOpen problems in hash function securitySome remarks on the TKIP key mixing function of IEEE 802.11iA matrix approach for constructing quadratic APN functionsTowards the optimality of Feistel ciphers with substitution-permutation functionsGeneralized Feistel networks revisitedGeneralization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphersCryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applicationsThe DBlock family of block ciphersOn the differential and linear efficiency of balanced Feistel networksA new construction of differentially 4-uniform \((n,n-1)\)-functionsCollision attack on \({\mathtt Grindahl}\)Analysis of \(3\)-line generalized Feistel networks with double SD-functionsOn the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxesAll the AES you need on Cortex-M3 and M4New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel networkAn efficient affine equivalence algorithm for multiple S-boxes and a structured affine layerA survey of some applications of finite fieldsAlmost perfect and planar functionsCryptanalysis of the stream cipher LEXMultiplicative complexity of vector valued Boolean functionsThe provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphersOn construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)Two improved multiple-differential collision attacksOn the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functionsWave-shaped round functions and primitive groupsVariants of the AES key schedule for better truncated differential boundsTowards key-dependent integral and impossible differential distinguishers on 5-round AESDifferential attacks: using alternative operationsOn circulant involutory MDS matricesAlmost involutory recursive MDS diffusion layersA new hybrid chaotic map and its application on image encryption and hidingInformation leakage of VGF2 structureAn ID-based signcryption scheme with compartmented secret sharing for unsigncryptionAKF: a key alternating Feistel scheme for lightweight cipher designsCryptographic properties and application of a generalized unbalanced Feistel network structureModeling energy-efficient secure communications in multi-mode wireless mobile devicesAlmost universal forgery attacks on AES-based MAC'sA methodology for differential-linear cryptanalysis and its applicationsImproved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512On weak differential uniformity of vectorial Boolean functions as a cryptographic criterionQuantum key-recovery on full AEZOn the direct construction of recursive MDS matricesImproving impossible-differential attacks against Rijndael-160 and Rijndael-224Towards a general construction of recursive MDS diffusion layersImproving the security and efficiency of block ciphers based on LS-designsStatistical integral distinguisher with multi-structure and its application on AES-like ciphersA novel secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systemsMinimizing the two-round Even-Mansour cipherImage encryption with chaotically coupled chaotic mapsA new counting method to bound the number of active S-boxes in Rijndael and 3DGeneric attacks on the Lai-Massey schemeCellular automata based S-boxesSolving polynomial systems with noise over \(\mathbb{F}_2\): revisitedA novel method to identify initial values of chaotic maps in cybersecurityImpossible differential cryptanalysis using matrix methodLinearly equivalent s-boxes and the division propertyThe (related-key) impossible boomerang attack and its application to the AES block cipherImage encryption using chaotic coupled map lattices with time-varying delaysA note on some algebraic trapdoors for block ciphersCMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networksThe effects of the omission of last round's MixColumns on AESMRHS solver based on linear algebra and exhaustive searchNew LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity checkNonlinear diffusion layersAn application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipherGroup theoretic properties of Rijndael-like ciphersThe replacement of irreducible polynomial and affine mapping for the construction of a strong S-boxG-perfect nonlinear functionsSolving multiple right hand sides linear equationsProvable security of block ciphers against linear cryptanalysis: a mission impossible?New criteria for linear maps in AES-like ciphersRevisiting Gilbert's known-key distinguisherOn complexity of round transformationsPractical forgeries for ORANGEProvable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layersConstructing Strong S-Box by 2D Chaotic Map with Application to Irreversible Parallel Key ExpansionExtending AES improvements: A proposal for Alpha-MAC in view of collision resistanceSQUARE attack on block ciphers with low algebraic degreeMixColumns Coefficient Property and Security of the AES with A Secret S-BoxPractical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults?Speeding Up the Search Algorithm for the Best Differential and Best Linear TrailsMeet-in-the-Middle Technique for Integral Attacks against Feistel CiphersUnnamed ItemAn algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphersPrimitivity of PRESENT and other lightweight ciphersCryptanalysis of GrindahlDifferential spectra of a class of power permutations with Niho exponentsSecurity enhancement method using shortened error correcting codesEffective and efficient masking with low noise using small-Mersenne-prime ciphersEnhanced design and hardware implementation of a chaos-based block cipher for image protectionOptimized quantum implementation of AESTruncated boomerang attacks and application to AES-based ciphersA cryptographic and coding-theoretic perspective on the global rules of cellular automataEnergy consumption of protected cryptographic hardware cores. An experimental studyDifferential and linear properties of vectorial Boolean functions based on chiOn the primitivity of the AES-128 key-scheduleIntroducing a new connection between the entries of MDS matrices constructed by generalized Cauchy matrices in \(GF(2^q)\)Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingTriangulating rebound attack on AES-like hashingTriplicate functionsConstruction of recursive MDS matrices using DLS matricesFUTURE: a lightweight block cipher using an optimal diffusion matrixA small GIFT-COFB: lightweight bit-serial architecturesA Very Compact “Perfectly Masked” S-Box for AESSecurity Analysis of Some Diffusion Mechanisms Used in Chaotic CiphersMethods for Linear and Differential Cryptanalysis of Elastic Block CiphersAffine transformation in cryptographyEfficient Finite Fields in the Maxima Computer Algebra SystemOn Cryptographically Significant Mappings over GF(2 n )A Meet-in-the-Middle Attack on 8-Round AESEfficient Chaotic Encryption Scheme with OFB ModeNew Applications of Differential Bounds of the SDS StructureTrace representations of S-boxes and their applicationVectorizing Higher-Order MaskingNew statistical randomness tests: 4-bit template matching testsPROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHYMATRIX FORMULA FOR THE SPECTRUM OF OUTPUT DISTRIBUTION OF BLOCK CIPHER SCHEME AND STATISTICAL CRITERION BASED ON THIS FORMULAA MAC Mode for Lightweight Block CiphersLightweight MDS Generalized Circulant MatricesOn the Construction of Lightweight Circulant Involutory MDS MatricesAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEAutomatic Search for the Best Trails in ARX: Application to Block Cipher SpeckEfficient Design Strategies Based on the AES Round FunctionОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESMATHEMATICAL METHODS IN SOLUTIONS OF THE PROBLEMS PRESENTED AT THE THIRD INTERNATIONAL STUDENTS’ OLYMPIAD IN CRYPTOGRAPHYAn algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomialInformation Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR AntennaДвойственность разностного и линейного методов в криптографииStriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012Finding Effective SAT Partitionings Via Black-Box OptimizationEfficient Image Encryption Scheme Based on 4-Dimensional Chaotic MapsOn Integral Distinguishers of Rijndael Family of CiphersUnnamed ItemA New Structural-Differential Property of 5-Round AESOn the Multi-output Filtering Model and Its ApplicationsScalable PP-1 block cipherProgrammable Cellular Automata (PCA) Based Advanced Encryption Standard (AES) Hardware ArchitectureSlide Attacks on a Class of Hash FunctionsA New Attack on the LEX Stream CipherOn the Higher Order Nonlinearities of Boolean Functions and S-Boxes, and Their GeneralizationsImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesCryptanalysis of the CRUSH Hash FunctionAnalysis of Countermeasures Against Access Driven Cache Attacks on AESMore constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\)Boosting AES Performance on a Tiny Processor CoreSpeeding up Collision Search for Byte-Oriented Hash FunctionsРассеивающие свойства XSLP-шифровАнализ влияния линейной избыточности в S-боксах на аффинную эквивалентность в раундовых функциях XSL-схемСпектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметровПоказатели рассеивания линейной среды AES-подобных алгоритмов шифрованияПолное описание одного класса MDS-матриц над конечным полем характеристики 2The permutation group insight on the diffusion property of linear mappingsOn software implementation of Kuznyechik on Intel CPUsLinear and differential cryptanalysis: Another viewpointО линейном и разностном криптоанализе AES-подобных алгоритмов шифрованияPermutation Binomial Functions over Finite FieldsAttacking 9 and 10 Rounds of AES-256Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureLightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHTImpossible Differential Cryptanalysis of Reduced-Round SKINNYDistinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksAn Improved Fault Based Attack of the Advanced Encryption StandardCryptanalysis of a Generic Class of White-Box ImplementationsTwo Attacks on RadioGatúnNew Related-Key Boomerang Attacks on AESNew Impossible Differential Attacks on AESNew AES Software Speed RecordsUnnamed ItemThe Complexity of Public-Key CryptographyA Search Strategy to Optimize the Affine Variant Properties of S-BoxesFlaws of hypercube-like ciphersAlgorithm 959Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking DefensePractical key recovery attacks on FlexAEADMonomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended versionEfficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomialsInvariants for EA- and CCZ-equivalence of APN and AB functionsQuantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystemsConstruction of higher-level MDS matrices in nested SPNsCreation of S-box based on a hierarchy of Julia sets: image encryption approachA note on APN permutations in even dimensionEfficient key-dependent dynamic S-boxes based on permutated elliptic curvesAn STP-based model toward designing S-boxes with good cryptographic properties\(k\)-configurationsDifferential-ML distinguisher: machine learning based generic extension for differential cryptanalysisThe design of composite permutations with applications to DES-like S-boxesProjective aspects of the AES inversionMixture integral attacks on reduced-round AES with a known/secret S-boxComputing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphersPholkos -- efficient large-state tweakable block ciphers from the AES round functionTransparency order of \((n, m)\)-functions -- its further characterization and applicationsComputing the distribution of differentials over the non-linear mapping \(\chi \)MILP based differential attack on round reduced WARPSurvey on recent trends towards generalized differential and boomerang uniformitiesComputational aspects of the expected differential probability of 4-round AES and AES-like ciphersAggregated differentials and cryptanalysis of PP-1 and GOSTPrivate computation of polynomials over networksAsymptotically quasi-optimal cryptographyRandomized nonlinear software-oriented MDS diffusion layersImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128On the relationship between resilient Boolean functions and linear branch number of S-boxesExploring lightweight efficiency of ForkAESUnicyclic strong permutationsNew constructions of involutions over finite fieldsGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTA novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformationThe unified image encryption algorithm based on chaos and cubic S-boxThe phantom of differential characteristicsSome group-theoretical results on Feistel networks in a long-key scenarioThe number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functionsSystem-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memoryLesamnta-LW revisited: improved security analysis of primitive and new PRF modeRecursive MDS matrices over finite commutative ringsRigid commutators and a normalizer chainBounding the length of impossible differentials for SPN block ciphersPC-SyncBB: a privacy preserving collusion secure DCOP algorithmUpper-bound estimation of the average probabilities of integer-valued differentials in the composition of key adder, substitution block, and shift operatorComposable security against collective attacks of a modified BB84 QKD protocol with information only in one basisPeriodic template tests: a family of statistical randomness tests for a collection of binary sequencesRegular subgroups with large intersectionWhite-box cryptography: don't forget about grey-box attacksEfficient cache attacks on AES, and countermeasuresThe resistance of PRESENT-80 against related-key differential attacksOn the constructions of \(n\)-cycle permutationsTroika: a ternary cryptographic hash functionBreaking LWC candidates: sESTATE and Elephant in quantum settingConstruction of MDS matrices from generalized Feistel structuresConstruction of lightweight involutory MDS matricesComputing AES related-key differential characteristics with constraint programmingCryptographic properties of small bijective S-boxes with respect to modular additionDesign of fault-resilient S-boxes for AES-like block ciphersThe \(c\)-differential behavior of the inverse function under the \textit{EA}-equivalenceSemi-generic construction of public key encryption and identity-based encryption with equality testSecurity analysis of subterranean 2.0Distinguisher on full-round compression function of GOST RDigital image scrambling based on a new one-dimensional coupled sine mapChaotic substitution for highly autocorrelated data in encryption algorithmOn invariant subspaces in the Lai-Massey scheme and a primitivity reductionAn efficient anti-quantum lattice-based blind signature for blockchain-enabled systemsNew slide attacks on almost self-similar ciphersThe retracing boomerang attack\textsc{Friet}: an authenticated encryption scheme with built-in fault detectionNew representations of the AES key scheduleAutomatic search of meet-in-the-middle preimage attacks on AES-like hashing\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsThree third generation attacks on the format preserving encryption scheme FF3Leakage resilient value comparison with application to message authenticationBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesA chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) lettersThe inverse of circulant matrices over \(\mathrm{GF}(2^m )\)Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluationSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsR-2 composition tests: a family of statistical randomness tests for a collection of binary sequencesOn the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\)Differential \(\delta \)-uniformity and non-linearity of permutations over \(\mathbb{Z}_n\)More accurate results on the provable security of AES against impossible differential cryptanalysisOptimizing a password hashing function with hardware-accelerated symmetric encryptionThe summation-truncation hybrid: reusing discarded bits for freeA white-box speck implementation using self-equivalence encodingsImproved differential-linear attack with application to round-reduced Speck32/64Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxesEfficient recursive diffusion layers for block ciphers and hash functionsThe rebound attack and subspace distinguishers: application to WhirlpoolRevocable hierarchical identity-based authenticated key exchangeQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functionsOn the algebraic construction of cryptographically good \(32 \times 32\) binary linear transformationsIntegral characteristics by keyspace partitioningRegular complete permutation polynomials over \(\mathbb{F}_{2^n} \)Generating nonlinear codes for multi-bit symbol error correction using cellular automataTowards efficient LPN-based symmetric encryptionFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday boundTNT: how to tweak a block cipherOn a generalization of substitution-permutation networks: the HADES design strategyA theoretical analysis of generalized invariants of bijective S-boxesKey structures: improved related-key boomerang attack against the full AES-256Truncated differential properties of the diagonal set of inputs for 5-round AESLight but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphersOn construction of lightweight MDS matricesMDOPE: efficient multi-dimensional data order preserving encryption schemeOn the image of an affine subspace under the inverse function within a finite fieldQuantum impossible differential attacks: applications to AES and SKINNYNon-existence of one-byte active impossible differentials for 5-round AES in the master-key settingJammin' on the deckOptimizing the depth of quantum implementations of linear layersClustering effect of iterative differential and linear trailsRevisiting related-key boomerang attacks on AES using computer-aided toolLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersConstruction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applicationsConvexity of division property transitions: theory, algorithms and compact modelsAstrolabous: a universally composable time-lock encryption schemeTight security for key-alternating ciphers with correlated sub-keysSequential indifferentiability of confusion-diffusion networksAlgebraic properties of subquasigroups and construction of finite quasigroupsAnd Rijndael? Automatic related-key differential analysis of RijndaelSeveral MILP-Aided Attacks Against SNOW 2.0Simplified MITM modeling for permutations: new (quantum) attacksSemantic foundations for cost analysis of pipeline-optimized programsFour by four MDS matrices with the fewest XOR gates based on words\textsf{ISAP+}: \textsf{ISAP} with fast authenticationImproved truncated differential distinguishers of AES with concrete S-boxRevisiting \textit{BoolTest} -- on randomness testing using Boolean functionsQuantum circuit implementations of SM4 block cipher based on different gate setsPractical non-malleable codes from symmetric-key primitives in 2-split-state modelImpossible differential cryptanalysis on reduced-round PRINCEcoreExploring encrypted keyboards to defeat client-side scanning in end-to-end encryption systemsFurther insights on constructing quantum circuits for Camellia block cipherFrom unbalanced to perfect: implementation of low energy stream ciphersTwin column parity mixers and Gaston. A new mixing layer and permutationRevisiting the indifferentiability of the sum of permutationsAutomatic boomerang attacks search on Rijndael


Uses Software



This page was built for publication: