New security proofs and complexity records for Advanced Encryption Standard

O Kara - IEEE Access, 2023 - ieeexplore.ieee.org
Common block ciphers like AES specified by the NIST or KASUMI (A5/3) of GSM are
extensively utilized by billions of individuals globally to protect their privacy and maintain …

Pholkos–efficient large-state tweakable block ciphers from the AES round function

J Bossert, E List, S Lucks, S Schmitz - Cryptographers' Track at the RSA …, 2022 - Springer
This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state
and key sizes of≥ 256 and tweaks of either 128 or 256 bits. When encrypting large chunks …

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security

M Nakahashi, R Shiba, R Anand, M Rahman… - … on Information Security …, 2023 - Springer
In this paper we propose a new family of highly efficient and quantum secure AES-based
block cipher dubbed Ghidle, which supports a key size of 256 bits and a state size of 256 or …

Revisiting Yoyo Tricks on AES

SK Mondal, M Rahman, S Sarkar… - IACR Transactions on …, 2023 - tosc.iacr.org
At Asiacrypt 2017, Rønjom et al. presented key-independent distinguishers for different
numbers of rounds of AES, ranging from 3 to 6 rounds, in their work titled “Yoyo Tricks with …

Lower data attacks on Advanced Encryption Standard

O Kara - Turkish Journal of Electrical Engineering and …, 2024 - journals.tubitak.gov.tr
Abstract The Advanced Encryption Standard (AES) is one of the most commonly used and
analyzed encryption algorithms. In this work, we present new combinations of some …

Yoyo cryptanalysis on Future

SK Mondal, M Rahman, S Sarkar… - … Journal of Applied …, 2024 - inderscienceonline.com
In ASIACRYPT 2017, Rønjom et al. reported Yoyo tricks on generic rounds of SPNs. Then
they applied it to AES and found the most effective way to distinguish AES in several rounds …

Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques

M Rahman - 2022 - library.isical.ac.in
Symmetric key cryptography refers to the encryption methods in which the same key is used
by both the sender and the receiver. Cryptanalysis is a process of finding vulnerabilities in …

Cryptanalysis of FlexAEAD

M Rahman, D Saha, G Paul - International Conference on Cryptology in …, 2020 - Springer
This paper analyzes the internal keyed permutation of FlexAEAD which is a round-1
candidate of the NIST LightWeight Cryptography Competition. In our analysis, we report an …

A Note on Yoyo Trick with AES

SK Mondal - researchgate.net
In their paper titled “Yoyo Tricks with AES,” presented at Asiacrypt 2017, Rønjom et al.
provided key-independent distinguishers for varying AES round counts, from three to six …