


default search action
IACR Transactions on Symmetric Cryptology, Volume 2017
Volume 2017, Number 1, 2017
- María Naya-Plasencia, Bart Preneel:

Preface. 1-3 - Roberto Avanzi:

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes. 4-44 - Matthias Hamann, Matthias Krause, Willi Meier:

LIZARD - A Lightweight Stream Cipher for Power-constrained Devices. 45-79 - Christoph Dobraunig

, Maria Eichlseder
, Stefan Mangard
, Florian Mendel
, Thomas Unterluggauer:
ISAP - Towards Side-Channel Secure Authenticated Encryption. 80-105 - Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:

A Fast Single-Key Two-Level Universal Hash Function. 106-128 - Chaoyun Li

, Qingju Wang
:
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices. 129-155 - Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard:

Cryptanalysis of NORX v2.0. 156-174 - Zheng Li, Xiaoyang Dong, Xiaoyun Wang:

Conditional Cube Attack on Round-Reduced ASCON. 175-202 - Tomer Ashur

, Achiya Bar-On, Orr Dunkelman:
Cryptanalysis of GOST2. 203-214 - Li Lin, Wenling Wu:

Meet-in-the-Middle Attacks on Reduced-Round Midori64. 215-239 - Dhiman Saha

, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. 240-258 - Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:

Cube-like Attack on Round-Reduced Initialization of Ketje Sr. 259-280 - Siwei Sun

, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. 281-306 - Subhadeep Banik

, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. 307-328 - Silvia Mella, Joan Daemen, Gilles Van Assche:

New techniques for trail bounds and application to differential trails in Keccak. 329-357 - Zhengbin Liu, Yongqiang Li, Mingsheng Wang:

Optimal Differential Trails in SIMON-like Ciphers. 358-379 - Leif Both, Alexander May

:
The Approximate k-List Problem. 380-397 - Dusan Bozilov, Begül Bilgin

, Haci Ali Sahin:
A Note on 5-bit Quadratic Permutations' Classification. 398-404 - Giorgia Azzurra Marson, Bertram Poettering:

Security Notions for Bidirectional Channels. 405-426 - Ashwin Jha

, Avradip Mandal, Mridul Nandi:
On The Exact Security of Message Authentication Using Pseudorandom Functions. 427-448 - Pooya Farshim, Claudio Orlandi

, Razvan Rosie:
Security of Symmetric Primitives under Incorrect Usage of Keys. 449-473 - Thorsten Kranz, Gregor Leander

, Friedrich Wiemer
:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. 474-505 - Sylvain Ruhault:

SoK: Security Models for Pseudo-Random Number Generators. 506-544
Volume 2017, Number 2, 2017
- Yusuke Naito:

Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. 1-26 - Benoît Cogliati, Jooyoung Lee, Yannick Seurin:

New Constructions of MACs from (Tweakable) Block Ciphers. 27-58 - Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim

:
Human-readable Proof of the Related-Key Security of AES-128. 59-83 - Pooya Farshim, Louiza Khati, Damien Vergnaud

:
Security of Even-Mansour Ciphers under Key-Dependent Messages. 84-104 - Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam:

Turning Online Ciphers Off. 105-142 - Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi:

Understanding RUP Integrity of COLM. 143-161 - Kazuhiko Minematsu, Tetsu Iwata:

Cryptanalysis of PMACx, PMAC2x, and SIVx. 162-176 - Gaoli Wang, Yanzhao Shen, Fukang Liu:

Cryptanalysis of 48-step RIPEMD-160. 177-202 - Anne Canteaut, Eran Lambooij, Samuel Neves

, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. 203-227 - Shihui Fu, Xiutao Feng, Baofeng Wu:

Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies. 228-249
Volume 2017, Number 3, 2017
- Victor Cauchois, Clément Gomez, Reynald Lercier:

Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation. 1-23 - Yunwen Liu, Glenn De Witte, Adrián Ranea

, Tomer Ashur
:
Rotational-XOR Cryptanalysis of Reduced-round SPECK. 24-36 - Guozhen Liu, Mohona Ghosh, Ling Song

:
Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper). 37-72 - Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song

:
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. 73-107 - Shivam Bhasin, Dirmanto Jap, Thomas Peyrin:

Practical Evaluation of FSE 2016 Customized Encoding Countermeasure. 108-129 - Avijit Dutta

, Ashwin Jha, Mridul Nandi:
Tight Security Analysis of EHtM MAC. 130-150 - Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:

Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources. 151-168 - Céline Blondeau:

Accurate Estimate of the Advantage of Impossible Differential Attacks. 169-191 - Claude Carlet, Pierrick Méaux

, Yann Rotella:
Boolean functions with restricted input and their robustness; application to the FLIP cipher. 192-227 - Bart Mennink, Samuel Neves

:
Optimal PRFs from Blockcipher Designs. 228-252 - Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel:

Efficient Length Doubling From Tweakable Block Ciphers. 253-270 - Francesco Berti, Olivier Pereira, Thomas Peters, François-Xavier Standaert

:
On Leakage-Resilient Authenticated Encryption with Decryption Leakages. 271-293 - Dragos Rotaru, Nigel P. Smart, Martijn Stam:

Modes of Operation Suitable for Computing on Encrypted Data. 294-324
Volume 2017, Number 4, 2017
- Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer:

Farfalle: parallel permutation-based cryptography. 1-38 - Ting Li, Yao Sun, Maodong Liao, Dingkang Wang:

Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures. 39-57 - Bin Zhang, Xinxin Gong, Willi Meier:

Fast Correlation Attacks on Grain-like Small State Stream Ciphers. 58-81 - Subhadeep Banik

, Takanori Isobe, Tingting Cui, Jian Guo
:
Some cryptanalytic results on Lizard. 82-98 - Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:

MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. 99-129 - Jérémy Jean, Thomas Peyrin, Siang Meng Sim

, Jade Tourteaux:
Optimizing Implementations of Lightweight Building Blocks. 130-168 - Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin:

Direct Construction of Optimal Rotational-XOR Diffusion Primitives. 169-187 - Thorsten Kranz, Gregor Leander

, Ko Stoffelen, Friedrich Wiemer
:
Shorter Linear Straight-Line Programs for MDS Matrices. 188-211 - Kevin Atighehchi, Alexis Bonnecaze:

Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3. 212-239 - Tetsu Iwata, Yannick Seurin:

Reconsidering the Security Bound of AES-GCM-SIV. 240-267 - Nilanjan Datta, Avijit Dutta

, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. 268-305 - Eik List, Mridul Nandi:

ZMAC+ - An Efficient Variable-output-length Variant of ZMAC. 306-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














