default search action
Search dblp for Publications
export results for "stream:journals/tosc:"
@article{DBLP:journals/tosc/BariantBLPPP24, author = {Augustin Bariant and Jules Baudrin and Ga{\"{e}}tan Leurent and Clara Pernot and L{\'{e}}o Perrin and Thomas Peyrin}, title = {Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {35--67}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.35-67}, doi = {10.46586/TOSC.V2024.I2.35-67}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BariantBLPPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BerendsenM24, author = {Henk Berendsen and Bart Mennink}, title = {Tightening Leakage Resilience of the Suffix Keyed Sponge}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {459--496}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.459-496}, doi = {10.46586/TOSC.V2024.I1.459-496}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BerendsenM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BonnetainCLMN24, author = {Xavier Bonnetain and Margarita Cordero and Virginie Lallemand and Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {On Impossible Boomerang Attacks Application to Simon and SKINNYee}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {222--253}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.222-253}, doi = {10.46586/TOSC.V2024.I2.222-253}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BonnetainCLMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BonnetainS24, author = {Xavier Bonnetain and Andr{\'{e}} Schrottenloher}, title = {Single-Query Quantum Hidden Shift Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {266--297}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.266-297}, doi = {10.46586/TOSC.V2024.I3.266-297}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BonnetainS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraM24, author = {Christina Boura and Kazuhiko Minematsu}, title = {Preface to Volume 2024, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {1--4}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.1-4}, doi = {10.46586/TOSC.V2024.I1.1-4}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouraM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortyHNE24, author = {Debasmita Chakraborty and Hosein Hadipour and Phuong Hoa Nguyen and Maria Eichlseder}, title = {Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for {ARX} Designs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {84--176}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.84-176}, doi = {10.46586/TOSC.V2024.I3.84-176}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortyHNE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenGHSMW24, author = {Yuchao Chen and Tingting Guo and Lei Hu and Lina Shang and Shuping Mao and Peng Wang}, title = {Small Stretch Problem of the {DCT} Scheme and How to Fix It}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {114--134}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.114-134}, doi = {10.46586/TOSC.V2024.I1.114-134}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChenGHSMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChoCHLOS24, author = {Mingyu Cho and Woohyuk Chung and Jincheol Ha and Jooyoung Lee and Eun{-}Gyeol Oh and Mincheol Son}, title = {{FRAST:} TFHE-Friendly Cipher Based on Random S-Boxes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {1--43}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.1-43}, doi = {10.46586/TOSC.V2024.I3.1-43}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChoCHLOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChoiLL24, author = {Wonseok Choi and Jooyoung Lee and Yeongmin Lee}, title = {Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {35--70}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.35-70}, doi = {10.46586/TOSC.V2024.I1.35-70}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChoiLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezE24, author = {Patrick Derbez and Marie Euler}, title = {Equivalence of Generalised Feistel Networks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {412--440}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.412-440}, doi = {10.46586/TOSC.V2024.I1.412-440}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DerbezE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezFIRS24, author = {Patrick Derbez and Pierre{-}Alain Fouque and Takanori Isobe and Mostafizar Rahman and Andr{\'{e}} Schrottenloher}, title = {Key Committing Attacks against AES-based {AEAD} Schemes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {135--157}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.135-157}, doi = {10.46586/TOSC.V2024.I1.135-157}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DerbezFIRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DharEJKLM24, author = {Chandranan Dhar and Jordan Ethan and Ravindra Jejurikar and Mustafa Khairallah and Eik List and Sougata Mandal}, title = {Context-Committing Security of Leveled Leakage-Resilient {AEAD}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {348--370}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.348-370}, doi = {10.46586/TOSC.V2024.I2.348-370}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DharEJKLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DongGLPZ24, author = {Xiaoyang Dong and Jian Guo and Shun Li and Phuong Pham and Tianyu Zhang}, title = {Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {158--187}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.158-187}, doi = {10.46586/TOSC.V2024.I1.158-187}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DongGLPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GrassiKLRSW24, author = {Lorenzo Grassi and Dmitry Khovratovich and Reinhard L{\"{u}}ftenegger and Christian Rechberger and Markus Schofnegger and Roman Walch}, title = {Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {44--83}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.44-83}, doi = {10.46586/TOSC.V2024.I3.44-83}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GrassiKLRSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourGSE24, author = {Hosein Hadipour and Simon Gerhalter and Sadegh Sadeghi and Maria Eichlseder}, title = {Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, {PRESENT} and QARMAv2}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {234--325}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.234-325}, doi = {10.46586/TOSC.V2024.I1.234-325}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HadipourGSE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourT24, author = {Hosein Hadipour and Yosuke Todo}, title = {Cryptanalysis of QARMAv2}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {188--213}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.188-213}, doi = {10.46586/TOSC.V2024.I1.188-213}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HadipourT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Hu24, author = {Kai Hu}, title = {Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings with a Break-Fix Strategy}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {118--140}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.118-140}, doi = {10.46586/TOSC.V2024.I2.118-140}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Hu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuY24, author = {Kai Hu and Trevor Yap}, title = {Perfect Monomial Prediction for Modular Addition}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {177--199}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.177-199}, doi = {10.46586/TOSC.V2024.I3.177-199}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HuY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KelseyLM24, author = {John Kelsey and Stefan Lucks and Stephan M{\"{u}}ller}, title = {{XDRBG:} {A} Proposed Deterministic Random Bit Generator Based on Any {XOF}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {5--34}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.5-34}, doi = {10.46586/TOSC.V2024.I1.5-34}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KelseyLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeeH24, author = {Dongjae Lee and Seokhie Hong}, title = {Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced {AES-256} and {ARIA-256}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {238--265}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.238-265}, doi = {10.46586/TOSC.V2024.I3.238-265}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LeeH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LefevreM24, author = {Charlotte Lefevre and Bart Mennink}, title = {Permutation-Based Hashing Beyond the Birthday Bound}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {71--113}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.71-113}, doi = {10.46586/TOSC.V2024.I1.71-113}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LefevreM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeurentP24, author = {Ga{\"{e}}tan Leurent and Clara Pernot}, title = {Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {441--458}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.441-458}, doi = {10.46586/TOSC.V2024.I1.441-458}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LeurentP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LingCHGHHX24, author = {Qing Ling and Tingting Cui and Hongtao Hu and Sijia Gong and Zijun He and Jiali Huang and Jia Xiao}, title = {Finding Impossible Differentials in {ARX} Ciphers under Weak Keys}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {326--356}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.326-356}, doi = {10.46586/TOSC.V2024.I1.326-356}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LingCHGHHX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuKSM24, author = {Fukang Liu and Abul Kalam and Santanu Sarkar and Willi Meier}, title = {Algebraic Attack on FHE-Friendly Cipher {HERA} Using Multiple Collisions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {214--233}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.214-233}, doi = {10.46586/TOSC.V2024.I1.214-233}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuKSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuT24, author = {Chen Liu and Tian Tian}, title = {Dynamic Cube Attacks against Grain-128AEAD}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {190--221}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.190-221}, doi = {10.46586/TOSC.V2024.I2.190-221}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuYT24, author = {Yinuo Liu and Jing Yang and Tian Tian}, title = {Theoretical Linear Cryptanalysis of the 5G Standard Candidate {SNOW} 5G}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {141--165}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.141-165}, doi = {10.46586/TOSC.V2024.I2.141-165}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuYT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Rasoolzadeh24, author = {Shahram Rasoolzadeh}, title = {Addendum to Classification of All t-Resilient Boolean Functions with t + 4 Variables Classification of Quadratic and Cubic t-Resilient Boolean Functions with t + 5 Variables}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {298--301}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.298-301}, doi = {10.46586/TOSC.V2024.I3.298-301}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Rasoolzadeh24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RohitS24, author = {Raghvendra Rohit and Sumanta Sarkar}, title = {Reconstructing S-Boxes from Cryptographic Tables with Milp}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {3}, pages = {200--237}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i3.200-237}, doi = {10.46586/TOSC.V2024.I3.200-237}, timestamp = {Sat, 21 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/RohitS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ShenPS24, author = {Yaobin Shen and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {1--34}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.1-34}, doi = {10.46586/TOSC.V2024.I2.1-34}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ShenPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Steiner24, author = {Matthias Johann Steiner}, title = {Solving Degree Bounds for Iterated Polynomial Systems}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {357--411}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.357-411}, doi = {10.46586/TOSC.V2024.I1.357-411}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Steiner24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/StruckW24, author = {Patrick Struck and Maximiliane Weish{\"{a}}upl}, title = {Constructing Committing and Leakage-Resilient Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {497--528}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.497-528}, doi = {10.46586/TOSC.V2024.I1.497-528}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/StruckW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/TakeuchiTI24, author = {Ryunouchi Takeuchi and Yosuke Todo and Tetsu Iwata}, title = {Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {85--117}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.85-117}, doi = {10.46586/TOSC.V2024.I2.85-117}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/TakeuchiTI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangBDHLW24, author = {Jinliang Wang and Christina Boura and Patrick Derbez and Kai Hu and Muzhou Li and Meiqin Wang}, title = {Cryptanalysis of Full-Round BipBip}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {68--84}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.68-84}, doi = {10.46586/TOSC.V2024.I2.68-84}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/WangBDHLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/XiangWYSZZSL24, author = {Zejun Xiang and Xiaoyu Wang and Bo Yu and Bing Sun and Shasha Zhang and Xiangyong Zeng and Xuan Shen and Nian Li}, title = {Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {296--321}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.296-321}, doi = {10.46586/TOSC.V2024.I2.296-321}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/XiangWYSZZSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/XuXTQ24, author = {Zhichao Xu and Hong Xu and Lin Tan and Wenfeng Qi}, title = {Differential-Linear Cryptanalysis of Reduced Round ChaCha}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {166--189}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.166-189}, doi = {10.46586/TOSC.V2024.I2.166-189}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/XuXTQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YuanWSZZ24, author = {Yufei Yuan and Wenling Wu and Tairong Shi and Lei Zhang and Yu Zhang}, title = {A Framework to Improve the Implementations of Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {322--347}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.322-347}, doi = {10.46586/TOSC.V2024.I2.322-347}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/YuanWSZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangWT24, author = {Jianing Zhang and Haoyang Wang and Deng Tang}, title = {Impossible Boomerang Attacks Revisited Applications to Deoxys-BC, Joltik-BC and {SKINNY}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {2}, pages = {254--295}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i2.254-295}, doi = {10.46586/TOSC.V2024.I2.254-295}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZhangWT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AvanziBDEGNR23, author = {Roberto Avanzi and Subhadeep Banik and Orr Dunkelman and Maria Eichlseder and Shibam Ghosh and Marcel Nageler and Francesco Regazzoni}, title = {The QARMAv2 Family of Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {25--73}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.25-73}, doi = {10.46586/TOSC.V2023.I3.25-73}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/AvanziBDEGNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BalachandranJNP23, author = {Niranjan Balachandran and Ashwin Jha and Mridul Nandi and Soumit Pal}, title = {Revisiting Randomness Extraction and Key Derivation Using the {CBC} and Cascade Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {391--419}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.391-419}, doi = {10.46586/TOSC.V2023.I4.391-419}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BalachandranJNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaudrinFLNPS23, author = {Jules Baudrin and Patrick Felke and Gregor Leander and Patrick Neumann and L{\'{e}}o Perrin and Lukas Stennes}, title = {Commutative Cryptanalysis Made Practical}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {299--329}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.299-329}, doi = {10.46586/TOSC.V2023.I4.299-329}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaudrinFLNPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BelliniGGMP23, author = {Emanuele Bellini and David G{\'{e}}rault and Juan Grados and Rusydi H. Makarim and Thomas Peyrin}, title = {Boosting Differential-Linear Cryptanalysis of ChaCha7 with {MILP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {189--223}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.189-223}, doi = {10.46586/TOSC.V2023.I2.189-223}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BelliniGGMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BelliniGHR23, author = {Emanuele Bellini and David G{\'{e}}rault and Anna Hambitzer and Matteo Rossi}, title = {A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {184--212}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.184-212}, doi = {10.46586/TOSC.V2023.I3.184-212}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BelliniGHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertiGPSS23, author = {Francesco Berti and Chun Guo and Thomas Peters and Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Message Authentication in the Presence of Leakage and Faults}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {288--315}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.288-315}, doi = {10.46586/TOSC.V2023.I1.288-315}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BertiGPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeyneV23, author = {Tim Beyne and Michiel Verbauwhede}, title = {Integral Cryptanalysis Using Algebraic Transition Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {244--269}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.244-269}, doi = {10.46586/TOSC.V2023.I4.244-269}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BeyneV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BoeufCP23, author = {Aur{\'{e}}lien Boeuf and Anne Canteaut and L{\'{e}}o Perrin}, title = {Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {270--298}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.270-298}, doi = {10.46586/TOSC.V2023.I4.270-298}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BoeufCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BonnetainL23, author = {Xavier Bonnetain and Virginie Lallemand}, title = {On Boomerang Attacks on Quadratic Feistel Ciphers New results on {KATAN} and Simon}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {101--145}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.101-145}, doi = {10.46586/TOSC.V2023.I3.101-145}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BonnetainL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraDF23, author = {Christina Boura and Patrick Derbez and Margot Funk}, title = {Related-Key Differential Analysis of the {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {215--243}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.215-243}, doi = {10.46586/TOSC.V2023.I4.215-243}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouraDF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraM23, author = {Christina Boura and Bart Mennink}, title = {Preface to Volume 2023, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {1--4}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.1-4}, doi = {10.46586/TOSC.V2023.I1.1-4}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BouraM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenFIIIMMNST23, author = {Yu Long Chen and Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Akiko Inoue and Ryoma Ito and Tetsu Iwata and Kazuhiko Minematsu and Nicky Mouha and Yusuke Naito and Ferdinand Sibleyras and Yosuke Todo}, title = {Key Committing Security of {AEZ} and More}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {452--488}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.452-488}, doi = {10.46586/TOSC.V2023.I4.452-488}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChenFIIIMMNST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenGGLWWX23, author = {Shiyao Chen and Chun Guo and Jian Guo and Li Liu and Meiqin Wang and Puwen Wei and Zeyu Xu}, title = {Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {132--175}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.132-175}, doi = {10.46586/TOSC.V2023.I2.132-175}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChenGGLWWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CogliatiEJ23, author = {Beno{\^{\i}}t Cogliati and Jordan Ethan and Ashwin Jha}, title = {Subverting Telegram's End-to-End Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {5--40}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.5-40}, doi = {10.46586/TOSC.V2023.I1.5-40}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CogliatiEJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CogliatiEJS23, author = {Beno{\^{\i}}t Cogliati and Jordan Ethan and Ashwin Jha and Soumya Kanti Saha}, title = {On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {330--364}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.330-364}, doi = {10.46586/TOSC.V2023.I4.330-364}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CogliatiEJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DattaDDM23, author = {Nilanjan Datta and Shreya Dey and Avijit Dutta and Sougata Mandal}, title = {Cascading Four Round {LRW1} is Beyond Birthday Bound Secure}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {365--390}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.365-390}, doi = {10.46586/TOSC.V2023.I4.365-390}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DattaDDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DattaDNT23, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Suprita Talnikar}, title = {Tight Multi-User Security Bound of DbHtS}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {192--223}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.192-223}, doi = {10.46586/TOSC.V2023.I1.192-223}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DattaDNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DeyGM23, author = {Sabyasachi Dey and Hirendra Kumar Garai and Subhamoy Maitra}, title = {Cryptanalysis of Reduced Round ChaCha - New Attack {\&} Deeper Analysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {89--110}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.89-110}, doi = {10.46586/TOSC.V2023.I1.89-110}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DeyGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigMN23, author = {Christoph Dobraunig and Bart Mennink and Samuel Neves}, title = {EliMAC: Speeding Up LightMAC by around 20{\%}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {69--93}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.69-93}, doi = {10.46586/TOSC.V2023.I2.69-93}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DunkelmanGL23, author = {Orr Dunkelman and Shibam Ghosh and Eran Lambooij}, title = {Attacking the {IETF/ISO} Standard for Internal Re-keying {CTR-ACPKM}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {41--66}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.41-66}, doi = {10.46586/TOSC.V2023.I1.41-66}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DunkelmanGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DunkelmanGL23a, author = {Orr Dunkelman and Shibam Ghosh and Eran Lambooij}, title = {Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {176--188}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.176-188}, doi = {10.46586/TOSC.V2023.I2.176-188}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DunkelmanGL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GhoshAD23, author = {Koustabh Ghosh and Parisa Amiri{-}Eliasi and Joan Daemen}, title = {Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.1-24}, doi = {10.46586/TOSC.V2023.I3.1-24}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GhoshAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Grassi23, author = {Lorenzo Grassi}, title = {Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {94--131}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.94-131}, doi = {10.46586/TOSC.V2023.I2.94-131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Grassi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeanderRS23, author = {Gregor Leander and Shahram Rasoolzadeh and Lukas Stennes}, title = {Cryptanalysis of {HALFLOOP} Block Ciphers Destroying {HALFLOOP-24}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {58--82}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.58-82}, doi = {10.46586/TOSC.V2023.I4.58-82}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LeanderRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Lefevre23, author = {Charlotte Lefevre}, title = {Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {224--243}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.224-243}, doi = {10.46586/TOSC.V2023.I1.224-243}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Lefevre23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiHCGQ23, author = {Huina Li and Le He and Shiyao Chen and Jian Guo and Weidong Qiu}, title = {Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {74--100}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.74-100}, doi = {10.46586/TOSC.V2023.I3.74-100}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiHCGQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiLW23, author = {Yingxin Li and Fukang Liu and Gaoli Wang}, title = {Automating Collision Attacks on {RIPEMD-160}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {112--142}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.112-142}, doi = {10.46586/TOSC.V2023.I4.112-142}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuMOM23, author = {Fukang Liu and Mohammad Mahzoun and Morten {\O}ygarden and Willi Meier}, title = {Algebraic Attacks on {RAIN} and {AIM} Using Equivalent Representations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {166--186}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.166-186}, doi = {10.46586/TOSC.V2023.I4.166-186}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuMOM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MellaDA23, author = {Silvia Mella and Joan Daemen and Gilles Van Assche}, title = {Tighter Trail Bounds for Xoodoo}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {187--214}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.187-214}, doi = {10.46586/TOSC.V2023.I4.187-214}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MellaDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Mennink23, author = {Bart Mennink}, title = {Understanding the Duplex and Its Security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {1--46}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.1-46}, doi = {10.46586/TOSC.V2023.I2.1-46}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Mennink23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MondalRSA23, author = {Sandip Kumar Mondal and Mostafizar Rahman and Santanu Sarkar and Avishek Adhikari}, title = {Revisiting Yoyo Tricks on {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {28--57}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.28-57}, doi = {10.46586/TOSC.V2023.I4.28-57}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MondalRSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NagelerPE23, author = {Marcel Nageler and Felix Pallua and Maria Eichlseder}, title = {Finding Collisions for Round-Reduced Romulus-H}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {67--88}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.67-88}, doi = {10.46586/TOSC.V2023.I1.67-88}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/NagelerPE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NaitoSS23, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, title = {Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {420--451}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.420-451}, doi = {10.46586/TOSC.V2023.I4.420-451}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/NaitoSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/OzdemirBR23, author = {Bet{\"{u}}l Askin {\"{O}}zdemir and Tim Beyne and Vincent Rijmen}, title = {Multidimensional Linear Cryptanalysis of Feistel Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {1--27}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.1-27}, doi = {10.46586/TOSC.V2023.I4.1-27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/OzdemirBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Rasoolzadeh23, author = {Shahram Rasoolzadeh}, title = {Classification of All t-Resilient Boolean Functions with t + 4 Variables}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {213--226}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.213-226}, doi = {10.46586/TOSC.V2023.I3.213-226}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Rasoolzadeh23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SchrottenloherS23, author = {Andr{\'{e}} Schrottenloher and Marc Stevens}, title = {Simplified Modeling of {MITM} Attacks for Block Ciphers: New (Quantum) Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {146--183}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.146-183}, doi = {10.46586/TOSC.V2023.I3.146-183}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SchrottenloherS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ShenS23, author = {Yaobin Shen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {47--68}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.47-68}, doi = {10.46586/TOSC.V2023.I2.47-68}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ShenS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ShiFX23, author = {Haotian Shi and Xiutao Feng and Shengyuan Xu}, title = {A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {489--510}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.489-510}, doi = {10.46586/TOSC.V2023.I4.489-510}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ShiFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunCW23, author = {Yimeng Sun and Jiamin Cui and Meiqin Wang}, title = {Improved Attacks on LowMC with Algebraic Techniques}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {143--165}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.143-165}, doi = {10.46586/TOSC.V2023.I4.143-165}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SunCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunW23, author = {Ling Sun and Meiqin Wang}, title = {SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {111--151}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.111-151}, doi = {10.46586/TOSC.V2023.I1.111-151}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangWS23, author = {Dachao Wang and Baocang Wang and Siwei Sun}, title = {SAT-aided Automatic Search of Boomerang Distinguishers for {ARX} Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {152--191}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.152-191}, doi = {10.46586/TOSC.V2023.I1.152-191}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/WangWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/XuDG23, author = {Shanjie Xu and Qi Da and Chun Guo}, title = {Chosen-Key Secure Even-Mansour Cipher from a Single Permutation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {244--287}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.244-287}, doi = {10.46586/TOSC.V2023.I1.244-287}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/XuDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangLGJ23, author = {Bin Zhang and Ruitao Liu and Xinxin Gong and Lin Jiao}, title = {Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {83--111}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.83-111}, doi = {10.46586/TOSC.V2023.I4.83-111}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhangLGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangSWH23, author = {Zhiyu Zhang and Siwei Sun and Caibing Wang and Lei Hu}, title = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {224--252}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.224-252}, doi = {10.46586/TOSC.V2023.I2.224-252}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZhangSWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Banfi22, author = {Fabio Banfi}, title = {{SCB} Mode: Semantically Secure Length-Preserving Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.1-23}, doi = {10.46586/TOSC.V2022.I4.1-23}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Banfi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Banik22, author = {Subhadeep Banik}, title = {Cryptanalysis of Draco}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {92--104}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.92-104}, doi = {10.46586/TOSC.V2022.I4.92-104}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Banik22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BardehR22, author = {Navid Ghaedi Bardeh and Vincent Rijmen}, title = {New Key-Recovery Attack on Reduced-Round {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {43--62}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.43-62}, doi = {10.46586/TOSC.V2022.I2.43-62}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BardehR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BariantBLP22, author = {Augustin Bariant and Cl{\'{e}}mence Bouvier and Ga{\"{e}}tan Leurent and L{\'{e}}o Perrin}, title = {Algebraic Attacks against Some Arithmetization-Oriented Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {73--101}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.73-101}, doi = {10.46586/TOSC.V2022.I3.73-101}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BariantBLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaudrinCP22, author = {Jules Baudrin and Anne Canteaut and L{\'{e}}o Perrin}, title = {Practical Cube Attack against Nonce-Misused Ascon}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {120--144}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.120-144}, doi = {10.46586/TOSC.V2022.I4.120-144}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BaudrinCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleFLR22, author = {Christof Beierle and Patrick Felke and Gregor Leander and Sondre R{\o}njom}, title = {Decomposing Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {243--265}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.243-265}, doi = {10.46586/TOSC.V2022.I4.243-265}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BeierleFLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeyneL22, author = {Tim Beyne and Yunwen Liu}, title = {Truncated Differential Attacks on Contracting Feistel Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {141--160}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.141-160}, doi = {10.46586/TOSC.V2022.I2.141-160}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BeyneL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BrianFRV22, author = {Gianluca Brian and Antonio Faonio and Jo{\~{a}}o Ribeiro and Daniele Venturi}, title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.1-19}, doi = {10.46586/TOSC.V2022.I3.1-19}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BrianFRV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CidGGLRS22, author = {Carlos Cid and Lorenzo Grassi and Aldo Gunsing and Reinhard L{\"{u}}ftenegger and Christian Rechberger and Markus Schofnegger}, title = {Influence of the Linear Layer on the Algebraic Degree in SP-Networks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {110--137}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.110-137}, doi = {10.46586/TOSC.V2022.I1.110-137}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CidGGLRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DansarieDLS22, author = {Marcus Dansarie and Patrick Derbez and Gregor Leander and Lukas Stennes}, title = {Breaking {HALFLOOP-24}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {217--238}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.217-238}, doi = {10.46586/TOSC.V2022.I3.217-238}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DansarieDLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezL22, author = {Patrick Derbez and Baptiste Lambin}, title = {Fast {MILP} Models for Division Property}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {289--321}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.289-321}, doi = {10.46586/TOSC.V2022.I2.289-321}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DerbezL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DinurM22, author = {Itai Dinur and Bart Mennink}, title = {Preface to Volume 2022, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {1--4}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.1-4}, doi = {10.46586/TOSC.V2022.I1.1-4}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DinurM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ErlacherME22, author = {Johannes Erlacher and Florian Mendel and Maria Eichlseder}, title = {Bounds for the Security of Ascon against Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {64--87}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.64-87}, doi = {10.46586/TOSC.V2022.I1.64-87}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ErlacherME22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GrassiKRS22, author = {Lorenzo Grassi and Dmitry Khovratovich and Sondre R{\o}njom and Markus Schofnegger}, title = {The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {5--37}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.5-37}, doi = {10.46586/TOSC.V2022.I1.5-37}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GrassiKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GrassiOPS22, author = {Lorenzo Grassi and Silvia Onofri and Marco Pedicini and Luca Sozzi}, title = {Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp Application to Poseidon}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {20--72}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.20-72}, doi = {10.46586/TOSC.V2022.I3.20-72}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GrassiOPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourE22, author = {Hosein Hadipour and Maria Eichlseder}, title = {Integral Cryptanalysis of {WARP} based on Monomial Prediction}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {92--112}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.92-112}, doi = {10.46586/TOSC.V2022.I2.92-112}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HadipourE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourNE22, author = {Hosein Hadipour and Marcel Nageler and Maria Eichlseder}, title = {Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and {TWINE}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {271--302}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.271-302}, doi = {10.46586/TOSC.V2022.I3.271-302}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HadipourNE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HamannMKM22, author = {Matthias Hamann and Alexander Moch and Matthias Krause and Vasily Mikhalev}, title = {The {DRACO} Stream Cipher {A} Power-efficient Small-state Stream Cipher with Full Provable Security against {TMDTO} Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {1--42}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.1-42}, doi = {10.46586/TOSC.V2022.I2.1-42}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HamannMKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HirchMMD22, author = {Solane El Hirch and Silvia Mella and Alireza Mehrdad and Joan Daemen}, title = {Improved Differential and Linear Trail Bounds for {ASCON}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {145--178}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.145-178}, doi = {10.46586/TOSC.V2022.I4.145-178}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HirchMMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HosoyamadaIIIMS22, author = {Akinori Hosoyamada and Akiko Inoue and Ryoma Ito and Tetsu Iwata and Kazuhiko Minematsu and Ferdinand Sibleyras and Yosuke Todo}, title = {Cryptanalysis of Rocca and Feasibility of Its Security Claim}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {123--151}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.123-151}, doi = {10.46586/TOSC.V2022.I3.123-151}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HosoyamadaIIIMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuaDSZHW22, author = {Jialiang Hua and Xiaoyang Dong and Siwei Sun and Zhiyu Zhang and Lei Hu and Xiaoyun Wang}, title = {Improved {MITM} Cryptanalysis on Streebog}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {63--91}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.63-91}, doi = {10.46586/TOSC.V2022.I2.63-91}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HuaDSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuangBDM22, author = {Senyang Huang and Orna Agmon Ben{-}Yehuda and Orr Dunkelman and Alexander Maximov}, title = {Finding Collisions against 4-Round {SHA-3-384} in Practical Time}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {239--270}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.239-270}, doi = {10.46586/TOSC.V2022.I3.239-270}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HuangBDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/JohanssonMN22, author = {Thomas Johansson and Willi Meier and Vu Nguyen}, title = {Attacks on the Firekite Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {191--216}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.191-216}, doi = {10.46586/TOSC.V2022.I3.191-216}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/JohanssonMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Khairallah22, author = {Mustafa Khairallah}, title = {Security of {COFB} against Chosen Ciphertext Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {138--157}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.138-157}, doi = {10.46586/TOSC.V2022.I1.138-157}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Khairallah22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KidmoseT22, author = {Andreas B. Kidmose and Tyge Tiessen}, title = {A Formal Analysis of Boomerang Probabilities}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {88--109}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.88-109}, doi = {10.46586/TOSC.V2022.I1.88-109}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/KidmoseT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KimHSH22, author = {Seonggyeom Kim and Deukjo Hong and Jaechul Sung and Seokhie Hong}, title = {Accelerating the Best Trail Search on AES-Like Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {201--252}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.201-252}, doi = {10.46586/TOSC.V2022.I2.201-252}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/KimHSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LallemandMR22, author = {Virginie Lallemand and Marine Minier and Lo{\"{\i}}c Rouquette}, title = {Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to {WARP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {113--140}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.113-140}, doi = {10.46586/TOSC.V2022.I2.113-140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LallemandMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeanderR22, author = {Gregor Leander and Shahram Rasoolzadeh}, title = {Weak Tweak-Keys for the {CRAFT} Block Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {38--63}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.38-63}, doi = {10.46586/TOSC.V2022.I1.38-63}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LeanderR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiMSW22, author = {Muzhou Li and Nicky Mouha and Ling Sun and Meiqin Wang}, title = {Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {161--200}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.161-200}, doi = {10.46586/TOSC.V2022.I2.161-200}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiMSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiS22, author = {Ting Li and Yao Sun}, title = {SuperBall: {A} New Approach for {MILP} Modelings of Boolean Functions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {341--367}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.341-367}, doi = {10.46586/TOSC.V2022.I3.341-367}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuMSI22, author = {Fukang Liu and Willi Meier and Santanu Sarkar and Takanori Isobe}, title = {New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {102--122}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.102-122}, doi = {10.46586/TOSC.V2022.I3.102-122}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuMSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuMSWII22, author = {Fukang Liu and Willi Meier and Santanu Sarkar and Gaoli Wang and Ryoma Ito and Takanori Isobe}, title = {New Cryptanalysis of {ZUC-256} Initialization Using Modular Differences}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {152--190}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.152-190}, doi = {10.46586/TOSC.V2022.I3.152-190}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuMSWII22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuWFWSW22, author = {Qun Liu and Weijia Wang and Yanhong Fan and Lixuan Wu and Ling Sun and Meiqin Wang}, title = {Towards Low-Latency Implementation of Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {158--182}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.158-182}, doi = {10.46586/TOSC.V2022.I1.158-182}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuWFWSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuWSFWW22, author = {Qun Liu and Weijia Wang and Ling Sun and Yanhong Fan and Lixuan Wu and Meiqin Wang}, title = {More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {351--378}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.351-378}, doi = {10.46586/TOSC.V2022.I2.351-378}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuWSFWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MakarimR22, author = {Rusydi H. Makarim and Raghvendra Rohit}, title = {Towards Tight Differential Bounds of Ascon {A} Hybrid Usage of {SMT} and {MILP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {303--340}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.303-340}, doi = {10.46586/TOSC.V2022.I3.303-340}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MakarimR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MaramMPR22, author = {Varun Maram and Daniel Masny and Sikhar Patranabis and Srinivasan Raghuraman}, title = {On the Quantum Security of {OCB}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {379--414}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.379-414}, doi = {10.46586/TOSC.V2022.I2.379-414}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MaramMPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MayS22, author = {Alexander May and Lars Schlieper}, title = {Quantum Period Finding is Compression Robust}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {183--211}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.183-211}, doi = {10.46586/TOSC.V2022.I1.183-211}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MayS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MehrdadMGD22, author = {Alireza Mehrdad and Silvia Mella and Lorenzo Grassi and Joan Daemen}, title = {Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {253--288}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.253-288}, doi = {10.46586/TOSC.V2022.I2.253-288}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MehrdadMGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NakayaI22, author = {Kazuki Nakaya and Tetsu Iwata}, title = {Generalized Feistel Structures Based on Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {24--91}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.24-91}, doi = {10.46586/TOSC.V2022.I4.24-91}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/NakayaI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/PeyrinT22, author = {Thomas Peyrin and Quan Quan Tan}, title = {Mind Your Path: On (Key) Dependencies in Differential Characteristics}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {179--207}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.179-207}, doi = {10.46586/TOSC.V2022.I4.179-207}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/PeyrinT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Rasoolzadeh22, author = {Shahram Rasoolzadeh}, title = {Low-Latency Boolean Functions and Bijective S-boxes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {403--447}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.403-447}, doi = {10.46586/TOSC.V2022.I3.403-447}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Rasoolzadeh22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SahaKP22, author = {Sayandeep Saha and Mustafa Khairallah and Thomas Peyrin}, title = {Exploring Integrity of AEADs with Faults: Definitions and Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {291--324}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.291-324}, doi = {10.46586/TOSC.V2022.I4.291-324}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SahaKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunWW22, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Addendum to Linear Cryptanalyses of Three AEADs with {GIFT-128} as Underlying Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {1}, pages = {212--219}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i1.212-219}, doi = {10.46586/TOSC.V2022.I1.212-219}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/TodoI22, author = {Yosuke Todo and Takanori Isobe}, title = {Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {368--402}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.368-402}, doi = {10.46586/TOSC.V2022.I3.368-402}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/TodoI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/VenkateswarluKS22, author = {Ayineedi Venkateswarlu and Abhishek Kesarwani and Sumanta Sarkar}, title = {On the Lower Bound of Cost of {MDS} Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {266--290}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.266-290}, doi = {10.46586/TOSC.V2022.I4.266-290}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/VenkateswarluKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangFHGS22, author = {Senpeng Wang and Dengguo Feng and Bin Hu and Jie Guan and Tairong Shi}, title = {Practical Attacks on Full-round {FRIET}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {105--119}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.105-119}, doi = {10.46586/TOSC.V2022.I4.105-119}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/WangFHGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YangSSSH22, author = {Qianqian Yang and Ling Song and Siwei Sun and Danping Shi and Lei Hu}, title = {New Properties of the Double Boomerang Connectivity Table}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {208--242}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.208-242}, doi = {10.46586/TOSC.V2022.I4.208-242}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YangSSSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhouFZ22, author = {Zhaocun Zhou and Dengguo Feng and Bin Zhang}, title = {Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {322--350}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.322-350}, doi = {10.46586/TOSC.V2022.I2.322-350}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZhouFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001021, author = {Raghvendra Rohit and Santanu Sarkar}, title = {Diving Deep into the Weak Keys of Round Reduced Ascon}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {74--99}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.74-99}, doi = {10.46586/TOSC.V2021.I4.74-99}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001BJL021, author = {Zheng Yang and Zhiting Bao and Chenglu Jin and Zhe Liu and Jianying Zhou}, title = {PLCrypto: {A} Symmetric Cryptographic Library for Programmable Logic Controllers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {170--217}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.170-217}, doi = {10.46586/TOSC.V2021.I3.170-217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001BJL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001BPV21, author = {Elena Andreeva and Amit Singh Bhati and Bart Preneel and Damian Viz{\'{a}}r}, title = {1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {1--35}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.1-35}, doi = {10.46586/TOSC.V2021.I3.1-35}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001BPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/000421, author = {Yao Sun}, title = {Automatic Search of Cubes for Attacking Stream Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {100--123}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.100-123}, doi = {10.46586/TOSC.V2021.I4.100-123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/000421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/00250M21, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Improved guess-and-determine and distinguishing attacks on {SNOW-V}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {54--83}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.54-83}, doi = {10.46586/TOSC.V2021.I3.54-83}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/00250M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikCILMSS21, author = {Subhadeep Banik and Andrea Caforio and Takanori Isobe and Fukang Liu and Willi Meier and Kosei Sakamoto and Santanu Sarkar}, title = {Atom: {A} Stream Cipher with Double Key Filter}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {5--36}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.5-36}, doi = {10.46586/TOSC.V2021.I1.5-36}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BanikCILMSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikILMS21, author = {Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto}, title = {Orthros: {A} Low-Latency {PRF}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {37--77}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.37-77}, doi = {10.46586/TOSC.V2021.I1.37-77}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikILMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BoissierNR21, author = {Rachelle Heim Boissier and Camille No{\^{u}}s and Yann Rotella}, title = {Algebraic Collision Attacks on Keccak}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {239--268}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.239-268}, doi = {10.46586/TOSC.V2021.I1.239-268}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BoissierNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BronchainFLLPS21, author = {Olivier Bronchain and Sebastian Faust and Virginie Lallemand and Gregor Leander and L{\'{e}}o Perrin and Fran{\c{c}}ois{-}Xavier Standaert}, title = {{MOE:} Multiplication Operated Encryption with Trojan Resilience}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {78--129}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.78-129}, doi = {10.46586/TOSC.V2021.I1.78-129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BronchainFLLPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CaforioBTM0L021, author = {Andrea Caforio and Subhadeep Banik and Yosuke Todo and Willi Meier and Takanori Isobe and Fukang Liu and Bin Zhang}, title = {Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {36--73}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.36-73}, doi = {10.46586/TOSC.V2021.I4.36-73}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CaforioBTM0L021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortyCJN21, author = {Bishwajit Chakraborty and Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi}, title = {On Length Independent Security Bounds for the {PMAC} Family}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {423--445}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.423-445}, doi = {10.46586/TOSC.V2021.I2.423-445}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortyCJN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChauhanKS21, author = {Amit Kumar Chauhan and Abhishek Kumar and Somitra Kumar Sanadhya}, title = {Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced {AES-256}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {316--336}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.316-336}, doi = {10.46586/TOSC.V2021.I1.316-336}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChauhanKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenXZZ21, author = {Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang}, title = {On the Relationships between Different Methods for Degree Evaluation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {411--442}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.411-442}, doi = {10.46586/TOSC.V2021.I1.411-442}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChenXZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CogliatiELL0M21, author = {Beno{\^{\i}}t Cogliati and Jordan Ethan and Virginie Lallemand and ByeongHak Lee and Jooyoung Lee and Marine Minier}, title = {{CTET+:} {A} Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {1--35}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.1-35}, doi = {10.46586/TOSC.V2021.I4.1-35}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CogliatiELL0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Dansarie21, author = {Marcus Dansarie}, title = {Cryptanalysis of the SoDark Cipher for {HF} Radio Automatic Link Establishment}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {36--53}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.36-53}, doi = {10.46586/TOSC.V2021.I3.36-53}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Dansarie21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DattaDD21, author = {Nilanjan Datta and Avijit Dutta and Kushankur Dutta}, title = {Improved Security Bound of {(E/D)WCDM}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {138--176}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.138-176}, doi = {10.46586/TOSC.V2021.I4.138-176}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DattaDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DuttaNT21, author = {Avijit Dutta and Mridul Nandi and Suprita Talnikar}, title = {Permutation Based {EDM:} An Inverse Free {BBB} Secure {PRF}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {31--70}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.31-70}, doi = {10.46586/TOSC.V2021.I2.31-70}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DuttaNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GeraultPT21, author = {David G{\'{e}}rault and Thomas Peyrin and Quan Quan Tan}, title = {Exploring Differential-Based Distinguishers and Forgeries for {ASCON}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {102--136}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.102-136}, doi = {10.46586/TOSC.V2021.I3.102-136}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GeraultPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GjiritiRV21, author = {Emiljano Gjiriti and Reza Reyhanitabar and Damian Viz{\'{a}}r}, title = {Power Yoga: Variable-Stretch Security of {CCM} for Energy-Efficient Lightweight IoT}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {446--468}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.446-468}, doi = {10.46586/TOSC.V2021.I2.446-468}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GjiritiRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GongZ21, author = {Xinxin Gong and Bin Zhang}, title = {Resistance of {SNOW-V} against Fast Correlation Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {378--410}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.378-410}, doi = {10.46586/TOSC.V2021.I1.378-410}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GongZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GongZ21a, author = {Xinxin Gong and Bin Zhang}, title = {Comparing Large-unit and Bitwise Linear Approximations of {SNOW} 2.0 and {SNOW} 3G and Related Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {71--103}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.71-103}, doi = {10.46586/TOSC.V2021.I2.71-103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GongZ21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GrassiRS21, author = {Lorenzo Grassi and Christian Rechberger and Markus Schofnegger}, title = {Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {314--352}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.314-352}, doi = {10.46586/TOSC.V2021.I2.314-352}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GrassiRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoSWWY21, author = {Chun Guo and Fran{\c{c}}ois{-}Xavier Standaert and Weijia Wang and Xiao Wang and Yu Yu}, title = {Provable Security of {SP} Networks with Partial Non-Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {353--388}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.353-388}, doi = {10.46586/TOSC.V2021.I2.353-388}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoSWWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourBS21, author = {Hosein Hadipour and Nasour Bagheri and Ling Song}, title = {Improved Rectangle Attacks on {SKINNY} and {CRAFT}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {140--198}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.140-198}, doi = {10.46586/TOSC.V2021.I2.140-198}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HadipourBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HeLY21, author = {Le He and Xiaoen Lin and Hongbo Yu}, title = {Improved Preimage Attacks on 4-Round Keccak-224/256}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {217--238}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.217-238}, doi = {10.46586/TOSC.V2021.I1.217-238}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HeLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HodgesS21, author = {Philip W. Hodges and Douglas Stebila}, title = {Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {389--422}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.389-422}, doi = {10.46586/TOSC.V2021.I2.389-422}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HodgesS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HosoyamadaI21, author = {Akinori Hosoyamada and Tetsu Iwata}, title = {Provably Quantum-Secure Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {337--377}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.337-377}, doi = {10.46586/TOSC.V2021.I1.337-377}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HosoyamadaI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LinHY21, author = {Xiaoen Lin and Le He and Hongbo Yu}, title = {Improved Preimage Attacks on 3-Round Keccak-224/256}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {84--101}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.84-101}, doi = {10.46586/TOSC.V2021.I3.84-101}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LinHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuIM21, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {185--216}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.185-216}, doi = {10.46586/TOSC.V2021.I1.185-216}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuIM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuIMS21, author = {Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto}, title = {Weak Keys in Reduced {AEGIS} and Tiaoxin}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {104--139}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.104-139}, doi = {10.46586/TOSC.V2021.I2.104-139}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuIMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MouhaKASPTBITZ21, author = {Nicky Mouha and Nikolay Kolomeec and Danil Akhtiamov and Ivan Sutormin and Matvey Panferov and Kseniya Titova and Tatiana Bonich and Evgeniya Ishchukova and Natalia N. Tokareva and Bulat Zhantulikov}, title = {Maximums of the Additive Differential Probability of Exclusive-Or}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {292--313}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.292-313}, doi = {10.46586/TOSC.V2021.I2.292-313}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MouhaKASPTBITZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NiDJY21, author = {Boyu Ni and Xiaoyang Dong and Keting Jia and Qidi You}, title = {(Quantum) Collision Attacks on Reduced Simpira v2}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {222--248}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.222-248}, doi = {10.46586/TOSC.V2021.I2.222-248}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/NiDJY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Nyberg21, author = {Kaisa Nyberg}, title = {Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {4}, pages = {124--137}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i4.124-137}, doi = {10.46586/TOSC.V2021.I4.124-137}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Nyberg21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/QinDWJL21, author = {Lingyue Qin and Xiaoyang Dong and Xiaoyun Wang and Keting Jia and Yunwen Liu}, title = {Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in {SKINNY} and ForkSkinny}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {249--291}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.249-291}, doi = {10.46586/TOSC.V2021.I2.249-291}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/QinDWJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RahmanS021, author = {Mostafizar Rahman and Dhiman Saha and Goutam Paul}, title = {Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on {AES} and Pholkos}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {137--169}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.137-169}, doi = {10.46586/TOSC.V2021.I3.137-169}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/RahmanS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RohitHSS21, author = {Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun}, title = {Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {130--155}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.130-155}, doi = {10.46586/TOSC.V2021.I1.130-155}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/RohitHSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SakamotoLNKI21, author = {Kosei Sakamoto and Fukang Liu and Yuto Nakano and Shinsaku Kiyomoto and Takanori Isobe}, title = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {1--30}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.1-30}, doi = {10.46586/TOSC.V2021.I2.1-30}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SakamotoLNKI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunWW21, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Accelerating the Search of Differential and Linear Characteristics with the {SAT} Method}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {269--315}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.269-315}, doi = {10.46586/TOSC.V2021.I1.269-315}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunWW21a, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Linear Cryptanalyses of Three AEADs with {GIFT-128} as Underlying Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {199--221}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.199-221}, doi = {10.46586/TOSC.V2021.I2.199-221}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunWW21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZongDCLWL21, author = {Rui Zong and Xiaoyang Dong and Huaifeng Chen and Yiyuan Luo and Si Wang and Zheng Li}, title = {Towards Key-recovery-attack Friendly Distinguishers: Application to {GIFT-128}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {156--184}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.156-184}, doi = {10.46586/TOSC.V2021.I1.156-184}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZongDCLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AlTawyGMR20, author = {Riham AlTawy and Guang Gong and Kalikinkar Mandal and Raghvendra Rohit}, title = {{WAGE:} An Authenticated Encryption with a Twist}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {132--159}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.132-159}, doi = {10.13154/TOSC.V2020.IS1.132-159}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AlTawyGMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AlyABDS20, author = {Abdelrahaman Aly and Tomer Ashur and Eli Ben{-}Sasson and Siemen Dhooghe and Alan Szepieniec}, title = {Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {1--45}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.1-45}, doi = {10.13154/TOSC.V2020.I3.1-45}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AlyABDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikBDV20, author = {Subhadeep Banik and Khashayar Barooti and F. Bet{\"{u}}l Durak and Serge Vaudenay}, title = {Cryptanalysis of LowMC instances using single plaintext/ciphertext pair}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {130--146}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.130-146}, doi = {10.46586/TOSC.V2020.I4.130-146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BanikBDV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikBRV20, author = {Subhadeep Banik and Fatih Balli and Francesco Regazzoni and Serge Vaudenay}, title = {Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {185--232}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.185-232}, doi = {10.13154/TOSC.V2020.I1.185-232}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BanikBRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGL20, author = {Zhenzhen Bao and Jian Guo and Eik List}, title = {Extended Truncated-differential Distinguishers on Round-reduced {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {197--261}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.197-261}, doi = {10.13154/TOSC.V2020.I3.197-261}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BariantDL20, author = {Augustin Bariant and Nicolas David and Ga{\"{e}}tan Leurent}, title = {Cryptanalysis of Forkciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {233--265}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.233-265}, doi = {10.13154/TOSC.V2020.I1.233-265}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BariantDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleBSGPUVW20, author = {Christof Beierle and Alex Biryukov and Luan Cardoso dos Santos and Johann Gro{\ss}sch{\"{a}}dl and L{\'{e}}o Perrin and Aleksei Udovenko and Vesselin Velichkov and Qingju Wang}, title = {Lightweight {AEAD} and Hashing using the Sparkle Permutation Family}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {208--261}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.208-261}, doi = {10.13154/TOSC.V2020.IS1.208-261}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BeierleBSGPUVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleJKLMPSSS20, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, title = {{SKINNY-AEAD} and SKINNY-Hash}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {88--131}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.88-131}, doi = {10.13154/TOSC.V2020.IS1.88-131}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BeierleJKLMPSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BelliziaBBCDGLL20, author = {Davide Bellizia and Francesco Berti and Olivier Bronchain and Ga{\"{e}}tan Cassiers and S{\'{e}}bastien Duval and Chun Guo and Gregor Leander and Ga{\"{e}}tan Leurent and Itamar Levi and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi and Friedrich Wiemer}, title = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {295--349}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.295-349}, doi = {10.13154/TOSC.V2020.IS1.295-349}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeullensBUV20, author = {Ward Beullens and Tim Beyne and Aleksei Udovenko and Giuseppe Vitto}, title = {Cryptanalysis of the Legendre {PRF} and Generalizations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {313--330}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.313-330}, doi = {10.13154/TOSC.V2020.I1.313-330}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BeullensBUV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeyneCDM20, author = {Tim Beyne and Yu Long Chen and Christoph Dobraunig and Bart Mennink}, title = {Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {5--30}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.5-30}, doi = {10.13154/TOSC.V2020.IS1.5-30}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BeyneCDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BilginMDLS20, author = {Beg{\"{u}}l Bilgin and Lauren De Meyer and S{\'{e}}bastien Duval and Itamar Levi and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Low {AND} Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {144--184}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.144-184}, doi = {10.13154/TOSC.V2020.I1.144-184}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BilginMDLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouillaguetMS20, author = {Charles Bouillaguet and Florette Martinez and Julia Sauvage}, title = {Practical seed-recovery for the {PCG} Pseudo-Random Number Generator}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {175--196}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.175-196}, doi = {10.13154/TOSC.V2020.I3.175-196}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BouillaguetMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BoukerrouHLMM20, author = {Hamid Boukerrou and Paul Huynh and Virginie Lallemand and Bimal Mandal and Marine Minier}, title = {On the Feistel Counterpart of the Boomerang Connectivity Table Introduction and Analysis of the {FBCT}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {331--362}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.331-362}, doi = {10.13154/TOSC.V2020.I1.331-362}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BoukerrouHLMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraC20, author = {Christina Boura and Daniel Coggia}, title = {Efficient {MILP} Modelings for Sboxes and Linear Layers of {SPN} ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {327--361}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.327-361}, doi = {10.13154/TOSC.V2020.I3.327-361}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BouraC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CanteautDLNPPS20, author = {Anne Canteaut and S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Thomas Pornin and Andr{\'{e}} Schrottenloher}, title = {Saturnin: a suite of lightweight symmetric algorithms for post-quantum security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {160--207}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.160-207}, doi = {10.13154/TOSC.V2020.IS1.160-207}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CanteautDLNPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortiDJMN20, author = {Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas{-}L{\'{o}}pez and Mridul Nandi and Yu Sasaki}, title = {{ESTATE:} {A} Lightweight and Low Energy Authenticated Encryption Mode}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {350--389}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.350-389}, doi = {10.13154/TOSC.V2020.IS1.350-389}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortiDJMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortiDJMN20a, author = {Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Snehal Mitragotri and Mridul Nandi}, title = {From Combined to Hybrid: Making Feedback-based {AE} even Smaller}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {417--445}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.417-445}, doi = {10.13154/TOSC.V2020.IS1.417-445}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortiDJMN20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortiNTY20, author = {Avik Chakraborti and Mridul Nandi and Suprita Talnikar and Kan Yasuda}, title = {On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving {BBB} Security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {2}, pages = {1--39}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i2.1-39}, doi = {10.13154/TOSC.V2020.I2.1-39}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortiNTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortyJN20, author = {Bishwajit Chakraborty and Ashwin Jha and Mridul Nandi}, title = {On the Security of Sponge-type Authenticated Encryption Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {2}, pages = {93--119}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i2.93-119}, doi = {10.13154/TOSC.V2020.I2.93-119}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortyJN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChoiILLLMN20, author = {Wonseok Choi and Akiko Inoue and ByeongHak Lee and Jooyoung Lee and Eik List and Kazuhiko Minematsu and Yusuke Naito}, title = {Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {39--70}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.39-70}, doi = {10.46586/TOSC.V2020.I4.39-70}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChoiILLLMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenHPAK20, author = {Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Xoodyak, a lightweight cryptographic scheme}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {60--87}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.60-87}, doi = {10.13154/TOSC.V2020.IS1.60-87}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DaemenHPAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenMMR20, author = {Joan Daemen and Pedro Maat Costa Massolino and Alireza Mehrdad and Yann Rotella}, title = {The Subterranean 2.0 Cipher Suite}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {262--294}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.262-294}, doi = {10.13154/TOSC.V2020.IS1.262-294}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DaemenMMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DelauneDV20, author = {St{\'{e}}phanie Delaune and Patrick Derbez and Mathieu Vavrille}, title = {Catching the Fastest Boomerangs Application to {SKINNY}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {104--129}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.104-129}, doi = {10.46586/TOSC.V2020.I4.104-129}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DelauneDV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezF20, author = {Patrick Derbez and Pierre{-}Alain Fouque}, title = {Increasing Precision of Division Property}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {173--194}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.173-194}, doi = {10.46586/TOSC.V2020.I4.173-194}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DerbezF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezFM20, author = {Patrick Derbez and Pierre{-}Alain Fouque and Victor Mollimard}, title = {Fake Near Collisions Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {88--103}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.88-103}, doi = {10.46586/TOSC.V2020.I4.88-103}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DerbezFM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DinurL20, author = {Itai Dinur and Ga{\"{e}}tan Leurent}, title = {Preface to Volume 2020, Special Issue on Designs for the {NIST} Lightweight Standardisation Process}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {1--4}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.1-4}, doi = {10.13154/TOSC.V2020.IS1.1-4}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DinurL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMMPU20, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Bart Mennink and Robert Primas and Thomas Unterluggauer}, title = {Isap v2.0}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {390--416}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.390-416}, doi = {10.13154/TOSC.V2020.IS1.390-416}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigM20, author = {Christoph Dobraunig and Bart Mennink}, title = {Tightness of the Suffix Keyed Sponge Bound}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {195--212}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.195-212}, doi = {10.46586/TOSC.V2020.I4.195-212}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigRS20, author = {Christoph Dobraunig and Yann Rotella and Jan Schoone}, title = {Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {289--312}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.289-312}, doi = {10.13154/TOSC.V2020.I1.289-312}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GaoGWWW20, author = {Yuan Gao and Chun Guo and Meiqin Wang and Weijia Wang and Jiejing Wen}, title = {Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {305--326}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.305-326}, doi = {10.13154/TOSC.V2020.I3.305-326}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GaoGWWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GoudarziJKPRSS20, author = {Dahmun Goudarzi and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Thomas Peyrin and Matthieu Rivain and Yu Sasaki and Siang Meng Sim}, title = {Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {31--59}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.31-59}, doi = {10.13154/TOSC.V2020.IS1.31-59}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GoudarziJKPRSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GunsingDM20, author = {Aldo Gunsing and Joan Daemen and Bart Mennink}, title = {Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {362--366}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.362-366}, doi = {10.13154/TOSC.V2020.I3.362-366}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GunsingDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoPPS20, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {6--42}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.6-42}, doi = {10.13154/TOSC.V2020.I1.6-42}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoSSSSHW20, author = {Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang}, title = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes and Tweak Additions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {119--151}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.119-151}, doi = {10.13154/TOSC.V2020.I3.119-151}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoSSSSHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HaoJLMTW20, author = {Yonglin Hao and Lin Jiao and Chaoyun Li and Willi Meier and Yosuke Todo and Qingju Wang}, title = {Links between Division Property and Other Cube Attack Variants}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {363--395}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.363-395}, doi = {10.13154/TOSC.V2020.I1.363-395}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HaoJLMTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HebbornL20, author = {Phil Hebborn and Gregor Leander}, title = {Dasta - Alternative Linear Layer for Rasta}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {46--86}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.46-86}, doi = {10.13154/TOSC.V2020.I3.46-86}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HebbornL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HeilmanNTLCVD20, author = {Ethan Heilman and Neha Narula and Garrett Tanzer and James Lovejoy and Michael Colavita and Madars Virza and Tadge Dryja}, title = {Cryptanalysis of Curl-P and Other Attacks on the {IOTA} Cryptocurrency}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {367--391}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.367-391}, doi = {10.13154/TOSC.V2020.I3.367-391}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HeilmanNTLCVD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HosoyamadaNS20, author = {Akinori Hosoyamada and Mar{\'{\i}}a Naya{-}Plasencia and Yu Sasaki}, title = {Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {147--172}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.147-172}, doi = {10.46586/TOSC.V2020.I4.147-172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HosoyamadaNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuWW20, author = {Kai Hu and Qingju Wang and Meiqin Wang}, title = {Finding Bit-Based Division Property for Ciphers with Complex Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {396--424}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.396-424}, doi = {10.13154/TOSC.V2020.I1.396-424}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HuWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/IwataKMP20, author = {Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin}, title = {Duel of the Titans: The Romulus and Remus Families of Lightweight {AEAD} Algorithms}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {43--120}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.43-120}, doi = {10.13154/TOSC.V2020.I1.43-120}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/IwataKMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KimLL20, author = {Hwigyeom Kim and Yeongmin Lee and Jooyoung Lee}, title = {Forking Tweakable Even-Mansour Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {71--87}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.71-87}, doi = {10.46586/TOSC.V2020.I4.71-87}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/KimLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeurentS20, author = {Ga{\"{e}}tan Leurent and Yu Sasaki}, title = {Preface to Volume 2020, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {1--5}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.1-5}, doi = {10.13154/TOSC.V2020.I1.1-5}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LeurentS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Minematsu20, author = {Kazuhiko Minematsu}, title = {Fast Decryption: a New Feature of Misuse-Resistant {AE}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {87--118}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.87-118}, doi = {10.13154/TOSC.V2020.I3.87-118}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Minematsu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NaitoSS20, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, title = {{LM-DAE:} Low-Memory Deterministic Authenticated Encryption for 128-bit Security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {1--38}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.1-38}, doi = {10.46586/TOSC.V2020.I4.1-38}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/NaitoSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NakamichiI20, author = {Ryota Nakamichi and Tetsu Iwata}, title = {Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {2}, pages = {68--92}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i2.68-92}, doi = {10.13154/TOSC.V2020.I2.68-92}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/NakamichiI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/PijnenburgP20, author = {Jeroen Pijnenburg and Bertram Poettering}, title = {Key Assignment Schemes with Authenticated Encryption, revisited}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {2}, pages = {40--67}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i2.40-67}, doi = {10.13154/TOSC.V2020.I2.40-67}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/PijnenburgP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/PoetteringR20, author = {Bertram Poettering and Paul R{\"{o}}sler}, title = {Combiners for {AEAD}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {121--143}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.121-143}, doi = {10.13154/TOSC.V2020.I1.121-143}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/PoetteringR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SahaSSSSZ20, author = {Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang}, title = {On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {152--174}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.152-174}, doi = {10.13154/TOSC.V2020.I3.152-174}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SahaSSSSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ShenGW20, author = {Yaobin Shen and Chun Guo and Lei Wang}, title = {Improved Security Bounds for Generalized Feistel Networks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {425--457}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.425-457}, doi = {10.13154/TOSC.V2020.I1.425-457}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ShenGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunGWW20, author = {Ling Sun and David G{\'{e}}rault and Wei Wang and Meiqin Wang}, title = {On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for {SPN} Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {262--287}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.262-287}, doi = {10.13154/TOSC.V2020.I3.262-287}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunGWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangHGZS20, author = {Senpeng Wang and Bin Hu and Jie Guan and Kai Zhang and Tairong Shi}, title = {Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {288--304}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.288-304}, doi = {10.13154/TOSC.V2020.I3.288-304}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/WangHGZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/XiangZLBZ20, author = {Zejun Xiang and Xiangyong Zeng and Da Lin and Zhenzhen Bao and Shasha Zhang}, title = {Optimizing Implementations of Linear Layers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {2}, pages = {120--145}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i2.120-145}, doi = {10.13154/TOSC.V2020.I2.120-145}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/XiangZLBZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YangJM20, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Spectral analysis of {ZUC-256}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {266--288}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.266-288}, doi = {10.13154/TOSC.V2020.I1.266-288}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YangJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AlbrechtHP19, author = {Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson}, title = {libInterMAC: Beyond Confidentiality and Integrity in Practice}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {46--83}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.46-83}, doi = {10.13154/TOSC.V2019.I1.46-83}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AlbrechtHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AnkeleDGLLT19, author = {Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo}, title = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {192--235}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.192-235}, doi = {10.13154/TOSC.V2019.I1.192-235}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AnkeleDGLLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ArmourP19, author = {Marcel Armour and Bertram Poettering}, title = {Substitution Attacks against Message Authentication}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {152--168}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.152-168}, doi = {10.13154/TOSC.V2019.I3.152-168}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ArmourP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikBI19, author = {Subhadeep Banik and Khashayar Barooti and Takanori Isobe}, title = {Cryptanalysis of Plantlet}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {103--120}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.103-120}, doi = {10.13154/TOSC.V2019.I3.103-120}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikBI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoDGWZ19, author = {Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang}, title = {Improved Meet-in-the-Middle Preimage Attacks against {AES} Hashing Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {318--347}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.318-347}, doi = {10.13154/TOSC.V2019.I4.318-347}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoDGWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGIM19, author = {Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {1--54}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.1-54}, doi = {10.13154/TOSC.V2019.I2.1-54}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGIM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGLS19, author = {Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki}, title = {{PEIGEN} - a Platform for Evaluation, Implementation, and Generation of S-boxes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {330--394}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.330-394}, doi = {10.13154/TOSC.V2019.I1.330-394}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleLMR19, author = {Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh}, title = {{CRAFT:} Lightweight Tweakable Block Cipher with Efficient Protection Against {DFA} Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {5--45}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.5-45}, doi = {10.13154/TOSC.V2019.I1.5-45}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BeierleLMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BonnetainNS19, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum Security Analysis of {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {55--93}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.55-93}, doi = {10.13154/TOSC.V2019.I2.55-93}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BonnetainNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraCC19, author = {Christina Boura and Anne Canteaut and Daniel Coggia}, title = {A General Proof Framework for Recent {AES} Distinguishers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {170--191}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.170-191}, doi = {10.13154/TOSC.V2019.I1.170-191}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouraCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CauchoisGT19, author = {Victor Cauchois and Cl{\'{e}}ment Gomez and Ga{\"{e}}l Thomas}, title = {General Diffusion Analysis: How to Find Optimal Permutations for Generalized Type-II Feistel Schemes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {264--301}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.264-301}, doi = {10.13154/TOSC.V2019.I1.264-301}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CauchoisGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortiDJMN19, author = {Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas{-}L{\'{o}}pez and Mridul Nandi and Yu Sasaki}, title = {{INT-RUP} Secure Lightweight Parallel {AE} Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {81--118}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.81-118}, doi = {10.13154/TOSC.V2019.I4.81-118}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortiDJMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChangDDMNSS19, author = {Donghoon Chang and Nilanjan Datta and Avijit Dutta and Bart Mennink and Mridul Nandi and Somitra Sanadhya and Ferdinand Sibleyras}, title = {Release of Unverified Plaintext: Tight Unified Model and Application to {ANYDAE}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {119--146}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.119-146}, doi = {10.13154/TOSC.V2019.I4.119-146}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChangDDMNSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ConnollyFF19, author = {Aisling Connolly and Pooya Farshim and Georg Fuchsbauer}, title = {Security of Symmetric Primitives against Key-Correlated Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {193--230}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.193-230}, doi = {10.13154/TOSC.V2019.I3.193-230}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ConnollyFF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezFLM19, author = {Patrick Derbez and Pierre{-}Alain Fouque and Baptiste Lambin and Victor Mollimard}, title = {Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {218--240}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.218-240}, doi = {10.13154/TOSC.V2019.I2.218-240}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DerbezFLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigM19, author = {Christoph Dobraunig and Bart Mennink}, title = {Security of the Suffix Keyed Sponge}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {223--248}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.223-248}, doi = {10.13154/TOSC.V2019.I4.223-248}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DunkelmanH19, author = {Orr Dunkelman and Senyang Huang}, title = {Reconstructing an S-box from its Difference Distribution Table}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {193--217}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.193-217}, doi = {10.13154/TOSC.V2019.I2.193-217}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DunkelmanH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/EichlsederNP19, author = {Maria Eichlseder and Marcel Nageler and Robert Primas}, title = {Analyzing the Linear Keystream Biases in {AEGIS}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {348--368}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.348-368}, doi = {10.13154/TOSC.V2019.I4.348-368}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/EichlsederNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Ekdahl0MY19, author = {Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang}, title = {A new {SNOW} stream cipher called {SNOW-V}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {1--42}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.1-42}, doi = {10.13154/TOSC.V2019.I3.1-42}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Ekdahl0MY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GrochowLN19, author = {Tony Grochow and Eik List and Mridul Nandi}, title = {DoveMAC: {A} TBC-based {PRF} with Smaller State, Full Security, and High Rate}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {43--80}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.43-80}, doi = {10.13154/TOSC.V2019.I3.43-80}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GrochowLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GunsingDM19, author = {Aldo Gunsing and Joan Daemen and Bart Mennink}, title = {Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {1--22}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.1-22}, doi = {10.13154/TOSC.V2019.I4.1-22}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GunsingDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoSWY19, author = {Chun Guo and Fran{\c{c}}ois{-}Xavier Standaert and Weijia Wang and Yu Yu}, title = {Efficient Side-Channel Secure Message Authentication with Better Bounds}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {23--53}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.23-53}, doi = {10.13154/TOSC.V2019.I4.23-53}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoSWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HadipourSNSB19, author = {Hosein Hadipour and Sadegh Sadeghi and Majid M. Niknam and Ling Song and Nasour Bagheri}, title = {Comprehensive security analysis of {CRAFT}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {290--317}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.290-317}, doi = {10.13154/TOSC.V2019.I4.290-317}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HadipourSNSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Kesarwani0V19, author = {Abhishek Kesarwani and Santanu Sarkar and Ayineedi Venkateswarlu}, title = {Exhaustive Search for Various Types of {MDS} Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {231--256}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.231-256}, doi = {10.13154/TOSC.V2019.I3.231-256}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Kesarwani0V19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Khairallah19, author = {Mustafa Khairallah}, title = {Weak Keys in the Rekeying Paradigm: Application to {COMET} and mixFeed}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {272--289}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.272-289}, doi = {10.13154/TOSC.V2019.I4.272-289}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Khairallah19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeeK19, author = {Jung{-}Keun Lee and Woo{-}Hwan Kim}, title = {Multiple Linear Cryptanalysis Using Linear Statistics}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {369--406}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.369-406}, doi = {10.13154/TOSC.V2019.I4.369-406}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LeeK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiDBJWM19, author = {Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier}, title = {New Conditional Cube Attack on Keccak Keyed Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {94--124}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.94-124}, doi = {10.13154/TOSC.V2019.I2.94-124}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiDBJWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiHW19, author = {Muzhou Li and Kai Hu and Meiqin Wang}, title = {Related-Tweak Statistical Saturation Cryptanalysis and Its Application on {QARMA}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {236--263}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.236-263}, doi = {10.13154/TOSC.V2019.I1.236-263}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiSLWH19, author = {Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu}, title = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {84--117}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.84-117}, doi = {10.13154/TOSC.V2019.I1.84-117}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiSLWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiSSLH19, author = {Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu}, title = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {147--170}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.147-170}, doi = {10.13154/TOSC.V2019.I4.147-170}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, title = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {169--192}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.169-192}, doi = {10.13154/TOSC.V2019.I3.169-192}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuIM19, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Cube-Based Cryptanalysis of Subterranean-SAE}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {192--222}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.192-222}, doi = {10.13154/TOSC.V2019.I4.192-222}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuIM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuQT19, author = {Guozhen Liu and Weidong Qiu and Yi Tu}, title = {New Techniques for Searching Differential Trails in Keccak}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {407--437}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.407-437}, doi = {10.13154/TOSC.V2019.I4.407-437}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuQT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MendelS19, author = {Florian Mendel and Yu Sasaki}, title = {Preface to Volume 2019, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {1--4}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.1-4}, doi = {10.13154/TOSC.V2019.I1.1-4}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MendelS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MeyerB19, author = {Lauren De Meyer and Beg{\"{u}}l Bilgin}, title = {Classification of Balanced Quadratic Functions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {169--192}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.169-192}, doi = {10.13154/TOSC.V2019.I2.169-192}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MeyerB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Naito19, author = {Yusuke Naito}, title = {The Exact Security of {PMAC} with Two Powering-Up Masks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {125--145}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.125-145}, doi = {10.13154/TOSC.V2019.I2.125-145}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Naito19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/NakamichiI19, author = {Ryota Nakamichi and Tetsu Iwata}, title = {Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {54--80}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.54-80}, doi = {10.13154/TOSC.V2019.I4.54-80}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/NakamichiI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Perrin19, author = {L{\'{e}}o Perrin}, title = {Partitions in the S-Box of Streebog and Kuznyechik}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {302--329}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.302-329}, doi = {10.13154/TOSC.V2019.I1.302-329}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Perrin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ShenW19, author = {Yaobin Shen and Lei Wang}, title = {On Beyond-Birthday-Bound Security: Revisiting the Development of {ISO/IEC} 9797-1 MACs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {146--168}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.146-168}, doi = {10.13154/TOSC.V2019.I2.146-168}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ShenW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SongQH19, author = {Ling Song and Xianrui Qin and Lei Hu}, title = {Boomerang Connectivity Table Revisited. Application to {SKINNY} and {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {118--141}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.118-141}, doi = {10.13154/TOSC.V2019.I1.118-141}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SongQH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangP19, author = {Haoyang Wang and Thomas Peyrin}, title = {Boomerang Switch in Multiple Rounds. Application to {AES} Variants and Deoxys}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {142--169}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.142-169}, doi = {10.13154/TOSC.V2019.I1.142-169}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/WangP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YangJM19, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Vectorized linear approximations for attacks on {SNOW} 3G}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {249--271}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.249-271}, doi = {10.13154/TOSC.V2019.I4.249-271}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YangJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YeT19, author = {Chen{-}Dong Ye and Tian Tian}, title = {Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {81--102}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.81-102}, doi = {10.13154/TOSC.V2019.I3.81-102}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YeT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangCGP19, author = {Wenying Zhang and Meichun Cao and Jian Guo and Enes Pasalic}, title = {Improved Security Evaluation of {SPN} Block Ciphers and its Applications in the Single-key Attack on {SKINNY}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {171--191}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.171-191}, doi = {10.13154/TOSC.V2019.I4.171-191}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhangCGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhaoDJ19, author = {Boxin Zhao and Xiaoyang Dong and Keting Jia}, title = {New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including {BDT} Effect}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {121--151}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.121-151}, doi = {10.13154/TOSC.V2019.I3.121-151}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZhaoDJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhouZDX19, author = {Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang}, title = {Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using {A} Divide-and-Conquer Approach}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {438--469}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.438-469}, doi = {10.13154/TOSC.V2019.I4.438-469}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhouZDX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001018, author = {Ling Song and Jian Guo}, title = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {182--214}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.182-214}, doi = {10.13154/TOSC.V2018.I3.182-214}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AlfaranoBIKL18, author = {Gianira N. Alfarano and Christof Beierle and Takanori Isobe and Stefan K{\"{o}}lbl and Gregor Leander}, title = {ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {20--47}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.20-47}, doi = {10.13154/TOSC.V2018.I2.20-47}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/AlfaranoBIKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikBLT18, author = {Subhadeep Banik and Andrey Bogdanov and Atul Luykx and Elmar Tischhauser}, title = {{SUNDAE:} Small Universal Deterministic Authenticated Encryption for the Internet of Things}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {1--35}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.1-35}, doi = {10.13154/TOSC.V2018.I3.1-35}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikBLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikMAIMBWR18, author = {Subhadeep Banik and Vasily Mikhalev and Frederik Armknecht and Takanori Isobe and Willi Meier and Andrey Bogdanov and Yuhei Watanabe and Francesco Regazzoni}, title = {Towards Low Energy Stream Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.1-19}, doi = {10.13154/TOSC.V2018.I2.1-19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BanikMAIMBWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGW18, author = {Zhenzhen Bao and Jian Guo and Lei Wang}, title = {Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {201--253}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.201-253}, doi = {10.13154/TOSC.V2018.I1.201-253}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleCL18, author = {Christof Beierle and Anne Canteaut and Gregor Leander}, title = {Nonlinear Approximations in Cryptanalysis Revisited}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {80--101}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.80-101}, doi = {10.13154/TOSC.V2018.I4.80-101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BeierleCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BhattacharyaN18, author = {Srimanta Bhattacharya and Mridul Nandi}, title = {Revisiting Variable Output Length {XOR} Pseudorandom Function}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {314--335}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.314-335}, doi = {10.13154/TOSC.V2018.I1.314-335}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BhattacharyaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BihamP18, author = {Eli Biham and Stav Perle}, title = {Conditional Linear Cryptanalysis - Cryptanalysis of {DES} with Less Than 242 Complexity}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {215--264}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.215-264}, doi = {10.13154/TOSC.V2018.I3.215-264}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BihamP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BogdanovTV18, author = {Andrey Bogdanov and Elmar Tischhauser and Philip S. Vejre}, title = {Multivariate Profiling of Hulls for Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {101--125}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.101-125}, doi = {10.13154/TOSC.V2018.I1.101-125}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BogdanovTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouillaguetDF18, author = {Charles Bouillaguet and Claire Delaplace and Pierre{-}Alain Fouque}, title = {Revisiting and Improving Algorithms for the 3XOR Problem}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {254--276}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.254-276}, doi = {10.13154/TOSC.V2018.I1.254-276}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouillaguetDF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraC18, author = {Christina Boura and Anne Canteaut}, title = {On the Boomerang Uniformity of Cryptographic Sboxes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {290--310}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.290-310}, doi = {10.13154/TOSC.V2018.I3.290-310}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouraC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGGJRS18, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and Jian Guo and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard and Ling Song}, title = {Key-Recovery Attacks on Full Kravatte}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {5--28}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.5-28}, doi = {10.13154/TOSC.V2018.I1.5-28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CrowleyB18, author = {Paul Crowley and Eric Biggers}, title = {Adiantum: length-preserving encryption for entry-level processors}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {39--61}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.39-61}, doi = {10.13154/TOSC.V2018.I4.39-61}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CrowleyB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenHAK18, author = {Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, title = {The design of Xoodoo and Xoofff}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {1--38}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.1-38}, doi = {10.13154/TOSC.V2018.I4.1-38}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DaemenHAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenMA18, author = {Joan Daemen and Bart Mennink and Gilles Van Assche}, title = {Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {197--228}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.197-228}, doi = {10.13154/TOSC.V2018.I4.197-228}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DaemenMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DattaDN018, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul}, title = {Double-block Hash-then-Sum: {A} Paradigm for Constructing {BBB} Secure {PRF}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {36--92}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.36-92}, doi = {10.13154/TOSC.V2018.I3.36-92}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DattaDN018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DerbezISSTWW18, author = {Patrick Derbez and Tetsu Iwata and Ling Sun and Siwei Sun and Yosuke Todo and Haoyang Wang and Meiqin Wang}, title = {Cryptanalysis of {AES-PRF} and Its Dual}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {161--191}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.161-191}, doi = {10.13154/TOSC.V2018.I2.161-191}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DerbezISSTWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DuvalL18, author = {S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, title = {{MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {48--78}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.48-78}, doi = {10.13154/TOSC.V2018.I2.48-78}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DuvalL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/EichlsederK18, author = {Maria Eichlseder and Daniel Kales}, title = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {111--132}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.111-132}, doi = {10.13154/TOSC.V2018.I2.111-132}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/EichlsederK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FauskangerS18, author = {Stian Fauskanger and Igor A. Semaev}, title = {Separable Statistics and Multidimensional Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {79--110}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.79-110}, doi = {10.13154/TOSC.V2018.I2.79-110}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FauskangerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FehrKM18, author = {Serge Fehr and Pierre Karpman and Bart Mennink}, title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {336--352}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.336-352}, doi = {10.13154/TOSC.V2018.I1.336-352}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FehrKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FuhrNR18, author = {Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Yann Rotella}, title = {State-Recovery Attacks on Modified Ketje Jr}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {29--56}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.29-56}, doi = {10.13154/TOSC.V2018.I1.29-56}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GhoshalSPDPM18, author = {Ashrujit Ghoshal and Rajat Sadhukhan and Sikhar Patranabis and Nilanjan Datta and Stjepan Picek and Debdeep Mukhopadhyay}, title = {Lightweight and Side-channel Secure 4 {\texttimes} 4 S-Boxes from Cellular Automata Rules}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {311--334}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.311-334}, doi = {10.13154/TOSC.V2018.I3.311-334}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GhoshalSPDPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Grassi18, author = {Lorenzo Grassi}, title = {Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {133--160}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.133-160}, doi = {10.13154/TOSC.V2018.I2.133-160}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Grassi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Hall-AndersenV18, author = {Mathias Hall{-}Andersen and Philip S. Vejre}, title = {Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {265--289}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.265-289}, doi = {10.13154/TOSC.V2018.I3.265-289}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Hall-AndersenV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuangW18, author = {Tao Huang and Hongjun Wu}, title = {Distinguishing Attack on {NORX} Permutation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {57--73}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.57-73}, doi = {10.13154/TOSC.V2018.I1.57-73}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HuangW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, title = {Key Assignment Scheme with Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {150--196}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.150-196}, doi = {10.13154/TOSC.V2018.I4.150-196}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LachariteP18, author = {Marie{-}Sarah Lacharit{\'{e}} and Kenneth G. Paterson}, title = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {277--313}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.277-313}, doi = {10.13154/TOSC.V2018.I1.277-313}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LachariteP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LeanderTW18, author = {Gregor Leander and Cihangir Tezcan and Friedrich Wiemer}, title = {Searching for Subspace Trails and Truncated Differentials}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {74--100}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.74-100}, doi = {10.13154/TOSC.V2018.I1.74-100}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LeanderTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiTYW18, author = {Yongqiang Li and Shizhu Tian and Yuyin Yu and Mingsheng Wang}, title = {On the Generalization of Butterfly Structure}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {160--179}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.160-179}, doi = {10.13154/TOSC.V2018.I1.160-179}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiTYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MendelN18, author = {Florian Mendel and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Preface to Volume 2018, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.1-4}, doi = {10.13154/TOSC.V2018.I1.1-4}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MendelN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Mennink18, author = {Bart Mennink}, title = {Key Prediction Security of Keyed Sponges}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {128--149}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.128-149}, doi = {10.13154/TOSC.V2018.I4.128-149}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Mennink18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RechbergerST18, author = {Christian Rechberger and Hadi Soleimany and Tyge Tiessen}, title = {Cryptanalysis of Low-Data Instances of Full LowMCv2}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {163--181}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.163-181}, doi = {10.13154/TOSC.V2018.I3.163-181}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/RechbergerST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SadeghiMB18, author = {Sadegh Sadeghi and Tahereh Mohammadi and Nasour Bagheri}, title = {Cryptanalysis of Reduced round {SKINNY} Block Cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {124--162}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.124-162}, doi = {10.13154/TOSC.V2018.I3.124-162}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SadeghiMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SahaR018, author = {Dhiman Saha and Mostafizar Rahman and Goutam Paul}, title = {New Yoyo Tricks with AES-based Permutations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {102--127}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.102-127}, doi = {10.13154/TOSC.V2018.I4.102-127}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SahaR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/StoffelenD18, author = {Ko Stoffelen and Joan Daemen}, title = {Column Parity Mixers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {126--159}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.126-159}, doi = {10.13154/TOSC.V2018.I1.126-159}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/StoffelenD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Sun0W18, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {More Accurate Differential Properties of {LED64} and Midori64}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {93--123}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.93-123}, doi = {10.13154/TOSC.V2018.I3.93-123}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Sun0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WeiYWP18, author = {Yongzhuang Wei and Tao Ye and Wenling Wu and Enes Pasalic}, title = {Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {62--79}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.62-79}, doi = {10.13154/TOSC.V2018.I4.62-79}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/WeiYWP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhouWS18, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {On Efficient Constructions of Lightweight {MDS} Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {180--200}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.180-200}, doi = {10.13154/TOSC.V2018.I1.180-200}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhouWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/000117, author = {Yusuke Naito}, title = {Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {1--26}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.1-26}, doi = {10.13154/TOSC.V2017.I2.1-26}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/000117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001BBNPS17, author = {Elena Andreeva and Guy Barwell and Ritam Bhaumik and Mridul Nandi and Dan Page and Martijn Stam}, title = {Turning Online Ciphers Off}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {105--142}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.105-142}, doi = {10.13154/TOSC.V2017.I2.105-142}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/0001BBNPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001STTY17, author = {Ahmed Abdelkhalek and Yu Sasaki and Yosuke Todo and Mohamed Tolba and Amr M. Youssef}, title = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {99--129}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.99-129}, doi = {10.13154/TOSC.V2017.I4.99-129}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/0001STTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AshurBD17, author = {Tomer Ashur and Achiya Bar{-}On and Orr Dunkelman}, title = {Cryptanalysis of {GOST2}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {203--214}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.203-214}, doi = {10.13154/TOSC.V2017.I1.203-214}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AshurBD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AtighehchiB17, author = {Kevin Atighehchi and Alexis Bonnecaze}, title = {Asymptotic Analysis of Plausible Tree Hash Modes for {SHA-3}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {212--239}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.212-239}, doi = {10.13154/TOSC.V2017.I4.212-239}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AtighehchiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Avanzi17, author = {Roberto Avanzi}, title = {The {QARMA} Block Cipher Family. Almost {MDS} Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {4--44}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.4-44}, doi = {10.13154/TOSC.V2017.I1.4-44}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Avanzi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikBIJ17, author = {Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen}, title = {Analysis of Software Countermeasures for Whitebox Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {307--328}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.307-328}, doi = {10.13154/TOSC.V2017.I1.307-328}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikBIJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikICG17, author = {Subhadeep Banik and Takanori Isobe and Tingting Cui and Jian Guo}, title = {Some cryptanalytic results on Lizard}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {82--98}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.82-98}, doi = {10.13154/TOSC.V2017.I4.82-98}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikICG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertiPPS17, author = {Francesco Berti and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On Leakage-Resilient Authenticated Encryption with Decryption Leakages}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {271--293}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.271-293}, doi = {10.13154/TOSC.V2017.I3.271-293}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BertiPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertoniDHPAK17, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Farfalle: parallel permutation-based cryptography}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {1--38}, year = {2017}, url = {https://tosc.iacr.org/index.php/ToSC/article/view/801}, timestamp = {Mon, 08 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BertoniDHPAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BhasinJP17, author = {Shivam Bhasin and Dirmanto Jap and Thomas Peyrin}, title = {Practical Evaluation of {FSE} 2016 Customized Encoding Countermeasure}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {108--129}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.108-129}, doi = {10.13154/TOSC.V2017.I3.108-129}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BhasinJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Blondeau17, author = {C{\'{e}}line Blondeau}, title = {Accurate Estimate of the Advantage of Impossible Differential Attacks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {169--191}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.169-191}, doi = {10.13154/TOSC.V2017.I3.169-191}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Blondeau17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BothM17, author = {Leif Both and Alexander May}, title = {The Approximate k-List Problem}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {380--397}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.380-397}, doi = {10.13154/TOSC.V2017.I1.380-397}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BothM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BozilovBS17, author = {Dusan Bozilov and Beg{\"{u}}l Bilgin and Haci Ali Sahin}, title = {A Note on 5-bit Quadratic Permutations' Classification}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {398--404}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.398-404}, doi = {10.13154/TOSC.V2017.I1.398-404}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BozilovBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CanteautLNRSS17, author = {Anne Canteaut and Eran Lambooij and Samuel Neves and Shahram Rasoolzadeh and Yu Sasaki and Marc Stevens}, title = {Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {203--227}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.203-227}, doi = {10.13154/TOSC.V2017.I2.203-227}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CanteautLNRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CarletMR17, author = {Claude Carlet and Pierrick M{\'{e}}aux and Yann Rotella}, title = {Boolean functions with restricted input and their robustness; application to the {FLIP} cipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {192--227}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.192-227}, doi = {10.13154/TOSC.V2017.I3.192-227}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CarletMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CauchoisGL17, author = {Victor Cauchois and Cl{\'{e}}ment Gomez and Reynald Lercier}, title = {Gr{\o}stl Distinguishing Attack: {A} New Rebound Attack of an AES-like Permutation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {1--23}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.1-23}, doi = {10.13154/TOSC.V2017.I3.1-23}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CauchoisGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGJR17, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, title = {Cryptanalysis of {NORX} v2.0}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {156--174}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.156-174}, doi = {10.13154/TOSC.V2017.I1.156-174}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortyGS17, author = {Debrup Chakraborty and Sebati Ghosh and Palash Sarkar}, title = {A Fast Single-Key Two-Level Universal Hash Function}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {106--128}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.106-128}, doi = {10.13154/TOSC.V2017.I1.106-128}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortyGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenLMP17, author = {Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel}, title = {Efficient Length Doubling From Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {253--270}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.253-270}, doi = {10.13154/TOSC.V2017.I3.253-270}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChenLMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CidHPSS17, author = {Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song}, title = {A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {73--107}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.73-107}, doi = {10.13154/TOSC.V2017.I3.73-107}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/CidHPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CogliatiLS17, author = {Beno{\^{\i}}t Cogliati and Jooyoung Lee and Yannick Seurin}, title = {New Constructions of MACs from (Tweakable) Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {27--58}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.27-58}, doi = {10.13154/TOSC.V2017.I2.27-58}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CogliatiLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DattaDN0Z17, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang}, title = {Single Key Variant of PMAC{\_}Plus}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {268--305}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.268-305}, doi = {10.13154/TOSC.V2017.I4.268-305}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DattaDN0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DattaLMN17, author = {Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi}, title = {Understanding {RUP} Integrity of {COLM}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {143--161}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.143-161}, doi = {10.13154/TOSC.V2017.I2.143-161}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DattaLMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEMMU17, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {80--105}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.80-105}, doi = {10.13154/TOSC.V2017.I1.80-105}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DongLWQ17, author = {Xiaoyang Dong and Zheng Li and Xiaoyun Wang and Ling Qin}, title = {Cube-like Attack on Round-Reduced Initialization of Ketje Sr}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {259--280}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.259-280}, doi = {10.13154/TOSC.V2017.I1.259-280}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DongLWQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DuttaJN17, author = {Avijit Dutta and Ashwin Jha and Mridul Nandi}, title = {Tight Security Analysis of EHtM {MAC}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {130--150}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.130-150}, doi = {10.13154/TOSC.V2017.I3.130-150}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DuttaJN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FarshimKV17, author = {Pooya Farshim and Louiza Khati and Damien Vergnaud}, title = {Security of Even-Mansour Ciphers under Key-Dependent Messages}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {84--104}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.84-104}, doi = {10.13154/TOSC.V2017.I2.84-104}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FarshimKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FarshimOR17, author = {Pooya Farshim and Claudio Orlandi and Razvan Rosie}, title = {Security of Symmetric Primitives under Incorrect Usage of Keys}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {449--473}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.449-473}, doi = {10.13154/TOSC.V2017.I1.449-473}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FarshimOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/FuFW17, author = {Shihui Fu and Xiutao Feng and Baofeng Wu}, title = {Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {228--249}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.228-249}, doi = {10.13154/TOSC.V2017.I2.228-249}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/FuFW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoLGWL17, author = {Zhiyuan Guo and Renzhang Liu and Si Gao and Wenling Wu and Dongdai Lin}, title = {Direct Construction of Optimal Rotational-XOR Diffusion Primitives}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {169--187}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.169-187}, doi = {10.13154/TOSC.V2017.I4.169-187}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoLGWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HamannKM17, author = {Matthias Hamann and Matthias Krause and Willi Meier}, title = {{LIZARD} - {A} Lightweight Stream Cipher for Power-constrained Devices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {45--79}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.45-79}, doi = {10.13154/TOSC.V2017.I1.45-79}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HamannKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/IwataS17, author = {Tetsu Iwata and Yannick Seurin}, title = {Reconsidering the Security Bound of {AES-GCM-SIV}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {240--267}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.240-267}, doi = {10.13154/TOSC.V2017.I4.240-267}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/IwataS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/JeanPST17, author = {J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Siang Meng Sim and Jade Tourteaux}, title = {Optimizing Implementations of Lightweight Building Blocks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {130--168}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.130-168}, doi = {10.13154/TOSC.V2017.I4.130-168}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/JeanPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/JhaMN17, author = {Ashwin Jha and Avradip Mandal and Mridul Nandi}, title = {On The Exact Security of Message Authentication Using Pseudorandom Functions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {427--448}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.427-448}, doi = {10.13154/TOSC.V2017.I1.427-448}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/JhaMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KhooLPS17, author = {Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim}, title = {Human-readable Proof of the Related-Key Security of {AES-128}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {59--83}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.59-83}, doi = {10.13154/TOSC.V2017.I2.59-83}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KhooLPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KranzLSW17, author = {Thorsten Kranz and Gregor Leander and Ko Stoffelen and Friedrich Wiemer}, title = {Shorter Linear Straight-Line Programs for {MDS} Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {188--211}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.188-211}, doi = {10.13154/TOSC.V2017.I4.188-211}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KranzLSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KranzLW17, author = {Thorsten Kranz and Gregor Leander and Friedrich Wiemer}, title = {Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {474--505}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.474-505}, doi = {10.13154/TOSC.V2017.I1.474-505}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KranzLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiDW17, author = {Zheng Li and Xiaoyang Dong and Xiaoyun Wang}, title = {Conditional Cube Attack on Round-Reduced {ASCON}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {175--202}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.175-202}, doi = {10.13154/TOSC.V2017.I1.175-202}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiSLW17, author = {Ting Li and Yao Sun and Maodong Liao and Dingkang Wang}, title = {Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {39--57}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.39-57}, doi = {10.13154/TOSC.V2017.I4.39-57}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiSLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiW17, author = {Chaoyun Li and Qingju Wang}, title = {Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {129--155}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.129-155}, doi = {10.13154/TOSC.V2017.I1.129-155}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LinW17, author = {Li Lin and Wenling Wu}, title = {Meet-in-the-Middle Attacks on Reduced-Round Midori64}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {215--239}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.215-239}, doi = {10.13154/TOSC.V2017.I1.215-239}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LinW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ListN17, author = {Eik List and Mridul Nandi}, title = {{ZMAC+} - An Efficient Variable-output-length Variant of {ZMAC}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {306--325}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.306-325}, doi = {10.13154/TOSC.V2017.I4.306-325}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ListN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuGL17, author = {Guozhen Liu and Mohona Ghosh and Ling Song}, title = {Security Analysis of {SKINNY} under Related-Tweakey Settings (Long Paper)}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {37--72}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.37-72}, doi = {10.13154/TOSC.V2017.I3.37-72}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuLW17, author = {Zhengbin Liu and Yongqiang Li and Mingsheng Wang}, title = {Optimal Differential Trails in SIMON-like Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {358--379}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.358-379}, doi = {10.13154/TOSC.V2017.I1.358-379}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/LiuLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiuWRA17, author = {Yunwen Liu and Glenn De Witte and Adri{\'{a}}n Ranea and Tomer Ashur}, title = {Rotational-XOR Cryptanalysis of Reduced-round {SPECK}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {24--36}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.24-36}, doi = {10.13154/TOSC.V2017.I3.24-36}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiuWRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MarsonP17, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Security Notions for Bidirectional Channels}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {405--426}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.405-426}, doi = {10.13154/TOSC.V2017.I1.405-426}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MarsonP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MellaDA17, author = {Silvia Mella and Joan Daemen and Gilles Van Assche}, title = {New techniques for trail bounds and application to differential trails in Keccak}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {329--357}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.329-357}, doi = {10.13154/TOSC.V2017.I1.329-357}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MellaDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MenninkN17, author = {Bart Mennink and Samuel Neves}, title = {Optimal PRFs from Blockcipher Designs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {228--252}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.228-252}, doi = {10.13154/TOSC.V2017.I3.228-252}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MenninkN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MinematsuI17, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Cryptanalysis of PMACx, PMAC2x, and SIVx}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {162--176}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.162-176}, doi = {10.13154/TOSC.V2017.I2.162-176}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MinematsuI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Naya-PlasenciaP17, author = {Mar{\'{\i}}a Naya{-}Plasencia and Bart Preneel}, title = {Preface}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.1-3}, doi = {10.13154/TOSC.V2017.I1.1-3}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Naya-PlasenciaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/RotaruSS17, author = {Dragos Rotaru and Nigel P. Smart and Martijn Stam}, title = {Modes of Operation Suitable for Computing on Encrypted Data}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {294--324}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.294-324}, doi = {10.13154/TOSC.V2017.I3.294-324}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/RotaruSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Ruhault17, author = {Sylvain Ruhault}, title = {SoK: Security Models for Pseudo-Random Number Generators}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {506--544}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.506-544}, doi = {10.13154/TOSC.V2017.I1.506-544}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Ruhault17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SahaKC17, author = {Dhiman Saha and Sukhendu Kuila and Dipanwita Roy Chowdhury}, title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {240--258}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.240-258}, doi = {10.13154/TOSC.V2017.I1.240-258}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SahaKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunGLYTQH17, author = {Siwei Sun and David G{\'{e}}rault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {281--306}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.281-306}, doi = {10.13154/TOSC.V2017.I1.281-306}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunGLYTQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/WangSL17, author = {Gaoli Wang and Yanzhao Shen and Fukang Liu}, title = {Cryptanalysis of 48-step {RIPEMD-160}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {177--202}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.177-202}, doi = {10.13154/TOSC.V2017.I2.177-202}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/WangSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangGM17, author = {Bin Zhang and Xinxin Gong and Willi Meier}, title = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {58--81}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.58-81}, doi = {10.13154/TOSC.V2017.I4.58-81}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhangGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhuMCLJ17, author = {Shuangyi Zhu and Yuan Ma and Tianyu Chen and Jingqiang Lin and Jiwu Jing}, title = {Analysis and Improvement of Entropy Estimators in {NIST} {SP} 800-90B for Non-IID Entropy Sources}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {151--168}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.151-168}, doi = {10.13154/TOSC.V2017.I3.151-168}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhuMCLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AshurL16, author = {Tomer Ashur and Yunwen Liu}, title = {Rotational Cryptanalysis in the Presence of Constants}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {57--70}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.57-70}, doi = {10.13154/TOSC.V2016.I1.57-70}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AshurL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BhaumikN16, author = {Ritam Bhaumik and Mridul Nandi}, title = {OleF: an Inverse-Free Online Cipher. An Online {SPRP} with an Optimal Inverse-Free Construction}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {30--51}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.30-51}, doi = {10.13154/TOSC.V2016.I2.30-51}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BhaumikN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BiryukovKP16, author = {Alex Biryukov and Dmitry Khovratovich and L{\'{e}}o Perrin}, title = {Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {226--247}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.226-247}, doi = {10.13154/TOSC.V2016.I2.226-247}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BiryukovKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BlondeauN16, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {162--191}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.162-191}, doi = {10.13154/TOSC.V2016.I2.162-191}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BlondeauN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CauchoisLM16, author = {Victor Cauchois and Pierre Loidreau and Nabil Merkiche}, title = {Direct construction of quasi-involutory recursive-like {MDS} matrices from 2-cyclic codes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {80--98}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.80-98}, doi = {10.13154/TOSC.V2016.I2.80-98}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CauchoisLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauG16, author = {Colin Chaigneau and Henri Gilbert}, title = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {114--133}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.114-133}, doi = {10.13154/TOSC.V2016.I1.114-133}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChoudhuriM16, author = {Arka Rai Choudhuri and Subhamoy Maitra}, title = {Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {261--287}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.261-287}, doi = {10.13154/TOSC.V2016.I2.261-287}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChoudhuriM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEKM16, author = {Christoph Dobraunig and Maria Eichlseder and Daniel Kales and Florian Mendel}, title = {Practical Key-Recovery Attack on {MANTIS5}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {248--260}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.248-260}, doi = {10.13154/TOSC.V2016.I2.248-260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DongW16, author = {Xiaoyang Dong and Xiaoyun Wang}, title = {Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {13--32}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.13-32}, doi = {10.13154/TOSC.V2016.I1.13-32}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DongW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/EndignouxV16, author = {Guillaume Endignoux and Damian Viz{\'{a}}r}, title = {Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {125--144}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.125-144}, doi = {10.13154/TOSC.V2016.I2.125-144}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/EndignouxV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GaziPR16, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, title = {The Exact Security of {PMAC}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {145--161}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.145-161}, doi = {10.13154/TOSC.V2016.I2.145-161}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GaziPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GrassiRR16, author = {Lorenzo Grassi and Christian Rechberger and Sondre R{\o}njom}, title = {Subspace Trail Cryptanalysis and its Applications to {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {192--225}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.192-225}, doi = {10.13154/TOSC.V2016.I2.192-225}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GrassiRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNQSS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {33--56}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.33-56}, doi = {10.13154/TOSC.V2016.I1.33-56}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {307--337}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.307-337}, doi = {10.13154/TOSC.V2016.I2.307-337}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoWLZ16, author = {Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang}, title = {Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and {OPP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {288--306}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.288-306}, doi = {10.13154/TOSC.V2016.I2.288-306}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoWLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/IwataM16, author = {Tetsu Iwata and Kazuhiko Minematsu}, title = {Stronger Security Variants of {GCM-SIV}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {134--157}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.134-157}, doi = {10.13154/TOSC.V2016.I1.134-157}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/IwataM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Jean16, author = {J{\'{e}}r{\'{e}}my Jean}, title = {Cryptanalysis of Haraka}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {1--12}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.1-12}, doi = {10.13154/TOSC.V2016.I1.1-12}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Jean16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Quantum Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {71--94}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.71-94}, doi = {10.13154/TOSC.V2016.I1.71-94}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KolblLMR16, author = {Stefan K{\"{o}}lbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger}, title = {Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {1--29}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.1-29}, doi = {10.13154/TOSC.V2016.I2.1-29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KolblLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LuykxMN16, author = {Atul Luykx and Bart Mennink and Samuel Neves}, title = {Security Analysis of BLAKE2's Modes of Operation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {158--176}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.158-176}, doi = {10.13154/TOSC.V2016.I1.158-176}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LuykxMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MikhalevAM16, author = {Vasily Mikhalev and Frederik Armknecht and Christian M{\"{u}}ller}, title = {On Ciphers that Continuously Access the Non-Volatile Key}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {52--79}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.52-79}, doi = {10.13154/TOSC.V2016.I2.52-79}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MikhalevAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/PerrinU16, author = {L{\'{e}}o Perrin and Aleksei Udovenko}, title = {Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {99--124}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.99-124}, doi = {10.13154/TOSC.V2016.I2.99-124}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/PerrinU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SarkarS16, author = {Sumanta Sarkar and Habeeb Syed}, title = {Lightweight Diffusion Layer: Importance of Toeplitz Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {95--113}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.95-113}, doi = {10.13154/TOSC.V2016.I1.95-113}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SarkarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.