An ultra-high throughput AES-based authenticated encryption scheme for 6G: Design and implementation

R Anand, S Banik, A Caforio, K Fukushima… - … on Research in …, 2023 - Springer
In this paper, we propose Rocca-S, an authenticated encryption scheme with a 256-bit key
and a 256-bit tag targeting 6G applications bootstrapped from AES. Rocca-S achieves an …

Improved guess-and-determine and distinguishing attacks on SNOW-V

J Yang, T Johansson, A Maximov - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-
determine (GnD) attacks against the full version with complexities $2^{384} $ and $2^{378} …

Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model

S Ma, C Jin, Z Shi, T Cui, J Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
SNOW-V and SNOW-Vi are two new LFSR-based stream ciphers of the SNOW family
designed for the 5G mobile communication system. Correlation attack is a well-known …

Weak keys in reduced AEGIS and tiaoxin

F Liu, T Isobe, W Meier, K Sakamoto - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives
submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the …

Rocca: an efficient AES-based encryption scheme for beyond 5G (full version)

K Sakamoto, F Liu, Y Nakano, S Kiyomoto… - Cryptology ePrint …, 2022 - eprint.iacr.org
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …

Single-query quantum hidden shift attacks

X Bonnetain, A Schrottenloher - IACR Transactions on Symmetric …, 2024 - inria.hal.science
Quantum attacks using superposition queries are known to break many classically secure
modes of operation. While these attacks do not necessarily threaten the security of the …

Efficient methods to search for best differential characteristics on SKINNY

S Delaune, P Derbez, P Huynh, M Minier… - … Conference on Applied …, 2021 - Springer
Evaluating resistance of ciphers against differential cryptanalysis is essential to define the
number of rounds of new designs and to mount attacks derived from differential …

(Quantum) collision attacks on reduced simpira v2

B Ni, X Dong, K Jia, Q You - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT
2016. In this paper, we build an improved MILP model to count the differential and linear …

COLM under attack: A cryptanalytic exploration of COLM variants

D Chakraborty, M Nandi - Journal of Information Security and Applications, 2025 - Elsevier
Abstract Authenticated Encryption with Associated Data (AEAD) schemes have become a
powerful solution for addressing contemporary security challenges. Within the recipients of …

LOL: a highly flexible framework for designing stream ciphers

D Feng, L Jiao, Y Hao, Q Zheng, W Wu, W Qi… - Science China …, 2024 - Springer
In this paper, we propose LOL, a general framework for designing blockwise stream ciphers.
The proposed framework achieves ultrafast software implementations for ubiquitous virtual …