Extended truncated-differential distinguishers on round-reduced AES

Z Bao, J Guo, E List - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Distinguishers on round-reduced AES have attracted considerable attention in the recent
years. While the number of rounds covered in key-recovery attacks did not increase …

[PDF][PDF] Cryptanalysis cipher text using new modeling: Text encryption using elliptic curve cryptography

MA Naji, DA Hammood, HA Atee… - AIP Conference …, 2020 - researchgate.net
Cryptanalysis is the investigation of cipher content, ciphers and cryptosystems with the point
of seeing how they work and finding and improving procedures for crushing or debilitating …

Towards closing the security gap of Tweak-aNd-Tweak (TNT)

C Guo, J Guo, E List, L Song - … 2020: 26th International Conference on the …, 2020 - Springer
Tweakable block ciphers (TBCs) have been established as a valuable replacement for many
applications of classical block ciphers. While several dedicated TBCs have been proposed …

Improved Truncated Differential Distinguishers of AES with Concrete S-Box

C Chang, M Wang, L Sun, W Wang - International Conference on …, 2022 - Springer
Abstract The security of Advanced Encryption Standard (AES) is one of the most important
issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open question about the …

On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers

G Paul, S Ray - Designs, Codes and Cryptography, 2018 - Springer
We revisit the different approaches used in the literature to estimate the data complexity of
distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process …

Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses

S Samajder, P Sarkar - Cryptography and Communications, 2018 - Springer
This work considers statistical analysis of attacks on block cyphers using several linear
approximations. A general and unified approach is adopted. To this end, the general key …

Another look at success probability in linear cryptanalysis

S Samajder, P Sarkar - Cryptology ePrint Archive, 2017 - eprint.iacr.org
This work studies the success probability of key recovery attacks based on using a single
linear approximation. Previous works had analysed success probability under different …

Can Large Deviation Theory be Used for Estimating Data Complexity?

S Samajder, P Sarkar - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Statistical analysis of attacks on block ciphers have mostly used normal approximations. A
few recent works have proposed doing away with normal approximations and instead use …

Неасимптотические нижние границы информационной сложности статистических атак на симметричные криптосистемы

АН Алексейчук - Кибернетика и системный анализ, 2018 - dspace.nbuv.gov.ua
Предложен метод получения нижних границ информационной сложности
статистических атак на блочные или поточные шифры. Метод основан на применении …

A new test statistic for key recovery attacks using multiple linear approximations

S Samajder, P Sarkar - International Conference on Cryptology in …, 2016 - Springer
The log-likelihood ratio (LLR) and the chi-squared distribution based test statistics have
been proposed in the literature for performing statistical analysis of key recovery attacks on …