Too much crypto

JP Aumasson - Cryptology EPrint Archive, 2019 - eprint.iacr.org
We show that many symmetric cryptography primitives would not be less safe with
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …

Improving the biclique cryptanalysis of AES

B Tao, H Wu - Information Security and Privacy: 20th Australasian …, 2015 - Springer
Biclique attack is currently the only key-recovery attack on the full AES with a single key.
Bogdanov et al. applied it to all the three versions of AES by constructing bicliques with size …

Revisiting related-key boomerang attacks on AES using computer-aided tool

P Derbez, M Euler, PA Fouque, PH Nguyen - International Conference on …, 2022 - Springer
In recent years, several MILP models were introduced to search automatically for
boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …

Analyzing multi-key security degradation

A Luykx, B Mennink, KG Paterson - … on the Theory and Applications of …, 2017 - Springer
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high
levels of security when used with many different keys, by many different users. Its …

[图书][B] Review of the advanced encryption standard

N Mouha, N Mouha - 2021 - csrc.nist.rip
The field of cryptography continues to advance at a very rapid pace, leading to new insights
that may impact the security properties of cryptographic algorithms. The Crypto Publication …

Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption

P Pranav, S Dutta, S Chakraborty - Soft Computing, 2021 - Springer
Cryptographic algorithms are composed of many complex mathematical functions. When
analyzing the complexity of these algorithms, one fixes priory the overall complexity of the …

Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC

C Dobraunig, E List - Topics in Cryptology–CT-RSA 2017: The …, 2017 - Springer
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014
alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except …

Generalized meet in the middle cryptanalysis of block ciphers with an automated search algorithm

S Ahmadi, MR Aref - IEEE Access, 2019 - ieeexplore.ieee.org
Meet in the middle (MITM) attack is one of the most important and applicable methods for
cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is …

[PDF][PDF] CryptAttackTester: formalizing attack analyses.

DJ Bernstein, T Chou - IACR Cryptol. ePrint Arch., 2023 - cat.cr.yp.to
Quantitative analyses of the costs of cryptographic attack algorithms play a central role in
comparing cryptosystems, guiding the search for improved attacks, and deciding which …

CryptAttackTester: high-assurance attack analysis

DJ Bernstein, T Chou - Annual International Cryptology Conference, 2024 - Springer
Quantitative analyses of the costs of cryptographic attack algorithms play a central role in
comparing cryptosystems, guiding the search for improved attacks, and deciding which …