Too much crypto
JP Aumasson - Cryptology EPrint Archive, 2019 - eprint.iacr.org
We show that many symmetric cryptography primitives would not be less safe with
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …
Improving the biclique cryptanalysis of AES
Biclique attack is currently the only key-recovery attack on the full AES with a single key.
Bogdanov et al. applied it to all the three versions of AES by constructing bicliques with size …
Bogdanov et al. applied it to all the three versions of AES by constructing bicliques with size …
Revisiting related-key boomerang attacks on AES using computer-aided tool
In recent years, several MILP models were introduced to search automatically for
boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …
boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …
Analyzing multi-key security degradation
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high
levels of security when used with many different keys, by many different users. Its …
levels of security when used with many different keys, by many different users. Its …
[图书][B] Review of the advanced encryption standard
N Mouha, N Mouha - 2021 - csrc.nist.rip
The field of cryptography continues to advance at a very rapid pace, leading to new insights
that may impact the security properties of cryptographic algorithms. The Crypto Publication …
that may impact the security properties of cryptographic algorithms. The Crypto Publication …
Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption
Cryptographic algorithms are composed of many complex mathematical functions. When
analyzing the complexity of these algorithms, one fixes priory the overall complexity of the …
analyzing the complexity of these algorithms, one fixes priory the overall complexity of the …
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
C Dobraunig, E List - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014
alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except …
alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except …
Generalized meet in the middle cryptanalysis of block ciphers with an automated search algorithm
Meet in the middle (MITM) attack is one of the most important and applicable methods for
cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is …
cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is …
[PDF][PDF] CryptAttackTester: formalizing attack analyses.
DJ Bernstein, T Chou - IACR Cryptol. ePrint Arch., 2023 - cat.cr.yp.to
Quantitative analyses of the costs of cryptographic attack algorithms play a central role in
comparing cryptosystems, guiding the search for improved attacks, and deciding which …
comparing cryptosystems, guiding the search for improved attacks, and deciding which …
CryptAttackTester: high-assurance attack analysis
DJ Bernstein, T Chou - Annual International Cryptology Conference, 2024 - Springer
Quantitative analyses of the costs of cryptographic attack algorithms play a central role in
comparing cryptosystems, guiding the search for improved attacks, and deciding which …
comparing cryptosystems, guiding the search for improved attacks, and deciding which …