Revisiting higher-order differential-linear attacks from an algebraic perspective

K Hu, T Peyrin, QQ Tan, T Yap - … Conference on the Theory and Application …, 2023 - Springer
Abstract The Higher-order Differential-Linear (HDL) attack was introduced by Biham et al. at
FSE 2005, where a linear approximation was appended to a Higher-order Differential (HD) …

Rocca: an efficient AES-based encryption scheme for beyond 5G

K Sakamoto, F Liu, Y Nakano, S Kiyomoto… - IACR Transactions on …, 2021 - tosc.iacr.org
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …

On the security margin of TinyJAMBU with refined differential and linear cryptanalysis

D Saha, Y Sasaki, D Shi, F Sibleyras, S Sun… - IACR Transactions on …, 2020 - tosc.iacr.org
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32
second-round candidates in NIST's lightweight cryptography standardization process …

A correlation attack on full SNOW-V and SNOW-Vi

Z Shi, C Jin, J Zhang, T Cui, L Ding, Y Jin - … International Conference on …, 2022 - Springer
In this paper, a method for searching correlations between the binary stream of Linear
Feedback Shift Register (LFSR) and the keystream of SNOW-V and SNOW-Vi is presented …

Analyzing the linear keystream biases in AEGIS

M Eichlseder, M Nageler, R Primas - IACR Transactions on Symmetric …, 2019 - tosc.iacr.org
AEGIS is one of the authenticated encryption designs selected for the final portfolio of the
CAESAR competition. It combines the AES round function and simple Boolean operations to …

Improved guess-and-determine and distinguishing attacks on SNOW-V

J Yang, T Johansson, A Maximov - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-
determine (GnD) attacks against the full version with complexities $2^{384} $ and $2^{378} …

Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model

S Ma, C Jin, Z Shi, T Cui, J Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
SNOW-V and SNOW-Vi are two new LFSR-based stream ciphers of the SNOW family
designed for the 5G mobile communication system. Correlation attack is a well-known …

A general correlation evaluation model on lfsr-based stream ciphers

Z Shi, C Jin, J Zhang, T Cui, L Ding… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, a general model for evaluating the correlations of correlation attack
distinguishers for an LFSR-based stream cipher is given by the Walsh spectrum theory of …

Weak keys in reduced AEGIS and tiaoxin

F Liu, T Isobe, W Meier, K Sakamoto - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives
submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the …

Rocca: an efficient AES-based encryption scheme for beyond 5G (full version)

K Sakamoto, F Liu, Y Nakano, S Kiyomoto… - Cryptology ePrint …, 2022 - eprint.iacr.org
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …