Revisiting higher-order differential-linear attacks from an algebraic perspective
Abstract The Higher-order Differential-Linear (HDL) attack was introduced by Biham et al. at
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …
Rocca: an efficient AES-based encryption scheme for beyond 5G
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …
scheme called Rocca, with the purpose to reach the requirements on the speed and security …
On the security margin of TinyJAMBU with refined differential and linear cryptanalysis
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32
second-round candidates in NIST's lightweight cryptography standardization process …
second-round candidates in NIST's lightweight cryptography standardization process …
A correlation attack on full SNOW-V and SNOW-Vi
Z Shi, C Jin, J Zhang, T Cui, L Ding, Y Jin - … International Conference on …, 2022 - Springer
In this paper, a method for searching correlations between the binary stream of Linear
Feedback Shift Register (LFSR) and the keystream of SNOW-V and SNOW-Vi is presented …
Feedback Shift Register (LFSR) and the keystream of SNOW-V and SNOW-Vi is presented …
Analyzing the linear keystream biases in AEGIS
AEGIS is one of the authenticated encryption designs selected for the final portfolio of the
CAESAR competition. It combines the AES round function and simple Boolean operations to …
CAESAR competition. It combines the AES round function and simple Boolean operations to …
Improved guess-and-determine and distinguishing attacks on SNOW-V
J Yang, T Johansson, A Maximov - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-
determine (GnD) attacks against the full version with complexities $2^{384} $ and $2^{378} …
determine (GnD) attacks against the full version with complexities $2^{384} $ and $2^{378} …
Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model
S Ma, C Jin, Z Shi, T Cui, J Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
SNOW-V and SNOW-Vi are two new LFSR-based stream ciphers of the SNOW family
designed for the 5G mobile communication system. Correlation attack is a well-known …
designed for the 5G mobile communication system. Correlation attack is a well-known …
A general correlation evaluation model on lfsr-based stream ciphers
Z Shi, C Jin, J Zhang, T Cui, L Ding… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, a general model for evaluating the correlations of correlation attack
distinguishers for an LFSR-based stream cipher is given by the Walsh spectrum theory of …
distinguishers for an LFSR-based stream cipher is given by the Walsh spectrum theory of …
Weak keys in reduced AEGIS and tiaoxin
Abstract AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives
submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the …
submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the …
Rocca: an efficient AES-based encryption scheme for beyond 5G (full version)
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …
scheme called Rocca, with the purpose to reach the requirements on the speed and security …