Truncated boomerang attacks and application to AES-based ciphers

A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …

Forking sums of permutations for optimally secure and highly efficient PRFs

A Dutta, J Guo, E List - Cryptology ePrint Archive, 2022 - eprint.iacr.org
The desirable encryption scheme possesses high PRF security, high efficiency, and the
ability to produce variable-length outputs. Since designing dedicated secure PRFs is …

Block cipher doubling for a post-quantum world

R Bhaumik, A Chailloux, P Frixons, B Mennink… - Cryptology ePrint …, 2022 - eprint.iacr.org
In order to maintain a similar security level in a post-quantum setting, many symmetric
primitives should have to double their keys and increase their state sizes. So far, no generic …

CTET+: A beyond-birthday-bound secure tweakable enciphering scheme using a single pseudorandom permutation

B Cogliati, J Ethan, V Lallemand, B Lee… - IACR Transactions on …, 2021 - tosc.iacr.org
In this work, we propose a construction of 2-round tweakable substitutionpermutation
networks using a single secret S-box. This construction is based on non-linear permutation …

Meet-in-the-middle attacks on AES with value constraints

X Dong, J Liu, Y Wei, W Gao, J Chen - Designs, Codes and Cryptography, 2024 - Springer
In meet-in-the-middle (MITM) attacks, the sizes of the precomputation tables determine the
effectiveness. In this paper, value constraints are presented to reduce the size of the …

Structural evaluation of AES-like ciphers against mixture differential cryptanalysis

X Xie, T Tian - Designs, Codes and Cryptography, 2023 - Springer
At ASIACRYPT 2017, Rønjom et al. analyzed AES with the yoyo attack. Similar to their 4-
round AES distinguisher, Grassi proposed the 4-round mixture differential cryptanalysis as …

Cycle structure of generalized and closed loop invariants

Y Wei, R Rodríguez, E Pasalic - Cryptology ePrint Archive, 2020 - eprint.iacr.org
This article gives a rigorous mathematical treatment of generalized and closed loop
invariants (CLI) which extend the standard notion of (nonlinear) invariants used in the …

Improved Truncated Differential Distinguishers of AES with Concrete S-Box

C Chang, M Wang, L Sun, W Wang - International Conference on …, 2022 - Springer
Abstract The security of Advanced Encryption Standard (AES) is one of the most important
issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open question about the …

Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system

Z Tolba - arXiv preprint arXiv:2402.15779, 2024 - arxiv.org
With the rising popularity of the internet and the widespread use of networks and information
systems via the cloud and data centers, the privacy and security of individuals and …

Block Cipher Doubling for a Post-Quantum World

M Naya-Plasencia, R Bhaumik, A Chailloux, P Frixons… - 2023 - inria.hal.science
In order to maintain a similar security level in a post-quantum setting, many symmetric
primitives should have to double their keys and increase their state sizes. So far, no generic …