Rotational Cryptanalysis from a Differential-Linear Perspective: Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette
Y Liu, S Sun, C Li - Advances in Cryptology–EUROCRYPT 2021: 40th …, 2021 - Springer
The differential-linear attack, combining the power of the two most effective techniques for
symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994 …
symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994 …
[HTML][HTML] Security analysis of lightweight IoT cipher: Chaskey
AD Dwivedi - Cryptography, 2020 - mdpi.com
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree
search based heuristic approach. ARX algorithms are suitable for resource-constrained …
search based heuristic approach. ARX algorithms are suitable for resource-constrained …
[HTML][HTML] Rotational differential-linear cryptanalysis revisited
Y Liu, Z Niu, S Sun, C Li, L Hu - Journal of Cryptology, 2023 - Springer
The differential-linear attack, combining the power of the two most effective techniques for
symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994 …
symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994 …
Machine learning assisted differential distinguishers for lightweight ciphers (extended version)
At CRYPTO 2019, Gohr first introduces the deep learning based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network based …
reduced SPECK. Using a deep residual network, Gohr trains several neural network based …
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers
M Huang, Z Xu, L Wang - The Computer Journal, 2022 - academic.oup.com
Rotational-XOR cryptanalysis is a very recent technique for ARX ciphers. In this paper, the
probability propagation formula of RX-cryptanalysis in modular addition is extended, and the …
probability propagation formula of RX-cryptanalysis in modular addition is extended, and the …
[PDF][PDF] A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
AM Badr, LC Fourati, S Ayed - Baghdad Science Journal, 2023 - iasj.net
Secure storage of confidential medical information is critical to healthcare organizations
seeking to protect patient's privacy and comply with regulatory requirements. This paper …
seeking to protect patient's privacy and comply with regulatory requirements. This paper …
Rotational cryptanalysis of salsa core function
R Ito - International Conference on Information Security, 2020 - Springer
This paper presents rotational cryptanalysis of the Salsa core function, and warns designers
of symmetric-key primitives not to incorporate the Salsa core function into other encryption …
of symmetric-key primitives not to incorporate the Salsa core function into other encryption …
[HTML][HTML] Bit-wise cryptanalysis on AND-RX permutation Friet-PC
This paper presents three attack vectors of bit-wise cryptanalysis including rotational, bit-
wise differential, and zero-sum distinguishing attacks on the AND-RX permutation Friet-PC …
wise differential, and zero-sum distinguishing attacks on the AND-RX permutation Friet-PC …
Rotational-linear attack: A new framework of cryptanalysis on ARX ciphers with applications to Chaskey
Y Xu, B Wu, D Lin - … Security: 23rd International Conference, ICICS 2021 …, 2021 - Springer
In this paper, we formulate a new framework of cryptanalysis called rotational-linear attack
on ARX ciphers. We firstly build an efficient distinguisher for the cipher E consisted of the …
on ARX ciphers. We firstly build an efficient distinguisher for the cipher E consisted of the …
Rotational Differential‐Linear Attack on Chaskey
Y Qin, G Wang, G Zhang - Security and Communication …, 2022 - Wiley Online Library
Rotational/Rotational‐XOR differential‐linear attack is a kind of powerful attack on ARX
primitives. In this paper, we analyse the message authentication code algorithm—Chaskey …
primitives. In this paper, we analyse the message authentication code algorithm—Chaskey …