default search action
44th CRYPTO 2024, Santa Barbara, CA, USA - Part IV
- Leonid Reyzin, Douglas Stebila:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14923, Springer 2024, ISBN 978-3-031-68384-8
Symmetric Cryptanalysis
- Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. 3-37 - Hosein Hadipour, Patrick Derbez, Maria Eichlseder:
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. 38-72 - Zhongfeng Niu, Kai Hu, Siwei Sun, Zhiyu Zhang, Meiqin Wang:
Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations. 73-104 - Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher:
Improving Generic Attacks Using Exceptional Functions. 105-138 - Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum:
The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. 139-173 - Ting Peng, Wentao Zhang, Jingsui Weng, Tianyou Ding:
New Approaches for Estimating the Bias of Differential-Linear Distinguishers. 174-205 - Gildas Avoine, Xavier Carpent, Tristan Claverie, Christophe Devine, Diane Leblanc-Albarel:
Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM. 206-240 - Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3. 241-272
Symmetric Cryptography
- Bing Sun, Zejun Xiang, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu:
Feistel-Like Structures Revisited: Classification and Cryptanalysis. 275-304 - Mihir Bellare, Viet Tung Hoang:
Succinctly-Committing Authenticated Encryption. 305-339 - Gregor Leander, Christof Paar, Julian Speith, Lukas Stennes:
HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits. 340-376 - Fangqi Dong, Qipeng Liu, Kewen Wu:
Tight Characterizations for Preprocessing Against Cryptographic Salting. 377-411 - Björn Kriepke, Gohar M. Kyureghyan:
Algebraic Structure of the Iterates of χ. 412-424 - Ritam Bhaumik, Bishwajit Chakraborty, Wonseok Choi, Avijit Dutta, Jérôme Govinden, Yaobin Shen:
The Committing Security of MACs with Applications to Generic Composition. 425-462 - Tim Beyne, Yu Long Chen:
Information-Theoretic Security with Asymmetries. 463-494
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.