Hirose, Shoichi; Sasaki, Yu; Yoshida, Hirotaka Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode. (English) Zbl 07314278 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 89-109 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{S. Hirose} et al., Lect. Notes Comput. Sci. 12146, 89--109 (2020; Zbl 07314278) Full Text: DOI
Denisov, O. V. Distinguishing attacks on block ciphers by differentials of two-block texts. (Russian. English summary) Zbl 07312015 Prikl. Diskretn. Mat. 2020, No. 48, 43-62 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{O. V. Denisov}, Prikl. Diskretn. Mat. 2020, No. 48, 43--62 (2020; Zbl 07312015) Full Text: DOI MNR
Liu, Yunwen; Zhang, Wenying; Sun, Bing; Rijmen, Vincent; Liu, Guoqiang; Li, Chao; Fu, Shaojing; Cao, Meichun The phantom of differential characteristics. (English) Zbl 07263374 Des. Codes Cryptography 88, No. 11, 2289-2311 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Liu} et al., Des. Codes Cryptography 88, No. 11, 2289--2311 (2020; Zbl 07263374) Full Text: DOI
Derbez, Patrick; Lallemand, Virginie; Udovenko, Aleksei Cryptanalysis of SKINNY in the framework of the SKINNY 2018–2019 cryptanalysis competition. (English) Zbl 1453.94073 Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 124-145 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Derbez} et al., Lect. Notes Comput. Sci. 11959, 124--145 (2020; Zbl 1453.94073) Full Text: DOI
Grassi, Lorenzo Probabilistic mixture differential cryptanalysis on round-reduced AES. (English) Zbl 1453.94082 Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 53-84 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Grassi}, Lect. Notes Comput. Sci. 11959, 53--84 (2020; Zbl 1453.94082) Full Text: DOI
Daemen, Joan; Rijmen, Vincent The design of Rijndael. The Advanced Encryption Standard (AES). 2nd revised and updated edition. (English) Zbl 1437.94001 Information Security and Cryptography. Berlin: Springer (ISBN 978-3-662-60768-8/hbk; 978-3-662-60769-5/ebook). xviii, 282 p. (2020). MSC: 94-01 68-01 68P25 94A60 PDF BibTeX XML Cite \textit{J. Daemen} and \textit{V. Rijmen}, The design of Rijndael. The Advanced Encryption Standard (AES). 2nd revised and updated edition. Berlin: Springer (2020; Zbl 1437.94001) Full Text: DOI
Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan Revised version of block cipher CHAM. (English) Zbl 1446.68065 Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 1-19 (2020). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{D. Roh} et al., Lect. Notes Comput. Sci. 11975, 1--19 (2020; Zbl 1446.68065) Full Text: DOI
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu A practical forgery attack on Lilliput-AE. (English) Zbl 07211768 J. Cryptology 33, No. 3, 910-916 (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{O. Dunkelman} et al., J. Cryptology 33, No. 3, 910--916 (2020; Zbl 07211768) Full Text: DOI
Xia, Yongbo; Zhang, Xianglai; Li, Chunlei; Helleseth, Tor The differential spectrum of a ternary power mapping. (English) Zbl 07189007 Finite Fields Appl. 64, Article ID 101660, 16 p. (2020). MSC: 94B15 11T71 PDF BibTeX XML Cite \textit{Y. Xia} et al., Finite Fields Appl. 64, Article ID 101660, 16 p. (2020; Zbl 07189007) Full Text: DOI
Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling Practical collision attacks against round-reduced SHA-3. (English) Zbl 1455.94160 J. Cryptology 33, No. 1, 228-270 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Guo} et al., J. Cryptology 33, No. 1, 228--270 (2020; Zbl 1455.94160) Full Text: DOI
Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine Computing AES related-key differential characteristics with constraint programming. (English) Zbl 07153699 Artif. Intell. 278, Article ID 103183, 24 p. (2020). MSC: 68T PDF BibTeX XML Cite \textit{D. Gerault} et al., Artif. Intell. 278, Article ID 103183, 24 p. (2020; Zbl 07153699) Full Text: DOI
Xin, Wenqian; Liu, Yunwen; Sun, Bing; Li, Chao Improved cryptanalysis on SipHash. (English) Zbl 1444.94109 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 61-79 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Xin} et al., Lect. Notes Comput. Sci. 11829, 61--79 (2019; Zbl 1444.94109) Full Text: DOI
Huang, Mingjiang; Wang, Liming Automatic tool for searching for differential characteristics in ARX ciphers and applications. (English) Zbl 1456.94087 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 115-138 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Huang} and \textit{L. Wang}, Lect. Notes Comput. Sci. 11898, 115--138 (2019; Zbl 1456.94087) Full Text: DOI
Bardeh, Navid Ghaedi; Rønjom, Sondre The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts. (English) Zbl 1455.94118 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 347-370 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{N. G. Bardeh} and \textit{S. Rønjom}, Lect. Notes Comput. Sci. 11923, 347--370 (2019; Zbl 1455.94118) Full Text: DOI
ElSheikh, Muhammad; Abdelkhalek, Ahmed; Youssef, Amr M. On MILP-based automatic search for differential trails through modular additions with application to Bel-T. (English) Zbl 1454.94066 Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11627, 273-296 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{M. ElSheikh} et al., Lect. Notes Comput. Sci. 11627, 273--296 (2019; Zbl 1454.94066) Full Text: DOI
Gohr, Aron Improving attacks on round-reduced Speck32/64 using deep learning. (English) Zbl 07178450 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-26950-0/pbk; 978-3-030-26951-7/ebook). Lecture Notes in Computer Science 11693, 150-179 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Gohr}, Lect. Notes Comput. Sci. 11693, 150--179 (2019; Zbl 07178450) Full Text: DOI
Canteaut, Anne; Lallemand, Virginie; Leander, Gregor; Neumann, Patrick; Wiemer, Friedrich BISON instantiating the whitened swap-or-not construction. (English) Zbl 07162741 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer (ISBN 978-3-030-17658-7/pbk; 978-3-030-17659-4/ebook). Lecture Notes in Computer Science 11478, 585-616 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Canteaut} et al., Lect. Notes Comput. Sci. 11478, 585--616 (2019; Zbl 07162741) Full Text: DOI
Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu Cryptanalysis of ForkAES. (English) Zbl 07160783 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-21567-5/pbk; 978-3-030-21568-2/ebook). Lecture Notes in Computer Science 11464, 43-63 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Banik} et al., Lect. Notes Comput. Sci. 11464, 43--63 (2019; Zbl 07160783) Full Text: DOI
Zhu, Baoyu; Dong, Xiaoyang; Yu, Hongbo MILP-based differential attack on round-reduced GIFT. (English) Zbl 07158420 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-12611-7/pbk; 978-3-030-12612-4/ebook). Lecture Notes in Computer Science 11405, 372-390 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Zhu} et al., Lect. Notes Comput. Sci. 11405, 372--390 (2019; Zbl 07158420) Full Text: DOI
Morawiecki, Paweł Malicious SHA-3. (English) Zbl 1428.94090 Fundam. Inform. 169, No. 4, 331-343 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Morawiecki}, Fundam. Inform. 169, No. 4, 331--343 (2019; Zbl 1428.94090) Full Text: DOI
Xu, Linhong; Guo, Jiansheng; Cui, Jingyi; Li, Mingming Related-key impossible differential attack on Piccolo. (Chinese. English summary) Zbl 1449.94065 J. Softw. 30, No. 8, 2349-2361 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Xu} et al., J. Softw. 30, No. 8, 2349--2361 (2019; Zbl 1449.94065) Full Text: DOI
Li, Mingming; Guo, Jiansheng; Cui, Jingyi; Xu, Linhong Truncated impossible differential cryptanalysis of Midori-64. (Chinese. English summary) Zbl 1449.94060 J. Softw. 30, No. 8, 2337-2348 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Li} et al., J. Softw. 30, No. 8, 2337--2348 (2019; Zbl 1449.94060) Full Text: DOI
Ma, Zhen; Tian, Tian; Qi, Wenfeng A new distinguishing attack on grain-V1 with 111 initialization rounds. (English) Zbl 07062241 J. Syst. Sci. Complex. 32, No. 3, 970-984 (2019). MSC: 94 PDF BibTeX XML Cite \textit{Z. Ma} et al., J. Syst. Sci. Complex. 32, No. 3, 970--984 (2019; Zbl 07062241) Full Text: DOI
Xie, Huiqin; Yang, Li Using Bernstein-Vazirani algorithm to attack block ciphers. (English) Zbl 1445.94029 Des. Codes Cryptography 87, No. 5, 1161-1182 (2019). Reviewer: Guillermo Morales Luna (Ciudad de México) MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{H. Xie} and \textit{L. Yang}, Des. Codes Cryptography 87, No. 5, 1161--1182 (2019; Zbl 1445.94029) Full Text: DOI
Civino, Roberto; Blondeau, Céline; Sala, Massimiliano Differential attacks: using alternative operations. (English) Zbl 1454.94059 Des. Codes Cryptography 87, No. 2-3, 225-247 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Civino} et al., Des. Codes Cryptography 87, No. 2--3, 225--247 (2019; Zbl 1454.94059) Full Text: DOI
Ankele, Ralph; Kölbl, Stefan Mind the gap – a closer look at the security of block ciphers against differential cryptanalysis. (English) Zbl 1447.94017 Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 163-190 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Ankele} and \textit{S. Kölbl}, Lect. Notes Comput. Sci. 11349, 163--190 (2019; Zbl 1447.94017) Full Text: DOI
Huang, Mingjiang; Wang, Liming; Zhang, Yan Improved automatic search algorithm for differential and linear cryptanalysis on SIMECK and the applications. (English) Zbl 07297658 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 664-681 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Huang} et al., Lect. Notes Comput. Sci. 11149, 664--681 (2018; Zbl 07297658) Full Text: DOI
Zhang, Shiwei; Chen, Shaozhen Automatic search algorithm for impossible differential trials and zero-correlation linear trials in SIMON. (Chinese. English summary) Zbl 1424.68156 J. Softw. 29, No. 11, 3544-3553 (2018). MSC: 68T20 68P25 PDF BibTeX XML Cite \textit{S. Zhang} and \textit{S. Chen}, J. Softw. 29, No. 11, 3544--3553 (2018; Zbl 1424.68156) Full Text: DOI
Yin, Qing; Wang, Nianping Further security evaluation for Piccolo structure against differential and linear cryptanalysis. (Chinese. English summary) Zbl 1424.94075 Acta Sci. Nat. Univ. Pekin. 54, No. 6, 1173-1178 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{Q. Yin} and \textit{N. Wang}, Acta Sci. Nat. Univ. Pekin. 54, No. 6, 1173--1178 (2018; Zbl 1424.94075) Full Text: DOI
Sajadieh, Mahdi; Vaziri, Mohammad Using MILP in analysis of Feistel structures and improving type II GFS by switching mechanism. (English) Zbl 1407.94150 Chakraborty, Debrup (ed.) et al., Progress in cryptology – INDOCRYPT 2018. 19th international conference on cryptology in India, New Delhi, India, December 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11356, 265-281 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Sajadieh} and \textit{M. Vaziri}, Lect. Notes Comput. Sci. 11356, 265--281 (2018; Zbl 1407.94150) Full Text: DOI
Anand, Ravi; Siddhanti, Akhilesh; Maitra, Subhamoy; Mukhopadhyay, Sourav Differential fault attack on SIMON with very few faults. (English) Zbl 1407.94070 Chakraborty, Debrup (ed.) et al., Progress in cryptology – INDOCRYPT 2018. 19th international conference on cryptology in India, New Delhi, India, December 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11356, 107-119 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Anand} et al., Lect. Notes Comput. Sci. 11356, 107--119 (2018; Zbl 1407.94070) Full Text: DOI
Yang, Jingchun; Liu, Meicheng; Lin, Dongdai; Wang, Wenhao Symbolic-like computation and conditional differential cryptanalysis of QUARK. (English) Zbl 1398.94182 Inomata, Atsuo (ed.) et al., Advances in information and computer security. 13th international workshop on security, IWSEC 2018, Sendai, Japan, September 3–5, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-97915-1/pbk; 978-3-319-97916-8/ebook). Lecture Notes in Computer Science 11049, 244-261 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Yang} et al., Lect. Notes Comput. Sci. 11049, 244--261 (2018; Zbl 1398.94182) Full Text: DOI
Marrière, Nicolas; Nachef, Valérie; Volte, Emmanuel Differential attacks on reduced round LILLIPUT. (English) Zbl 1444.94089 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 188-206 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Marrière} et al., Lect. Notes Comput. Sci. 10946, 188--206 (2018; Zbl 1444.94089) Full Text: DOI
Samajder, Subhabrata; Sarkar, Palash Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity. (English) Zbl 1419.94046 Cryptogr. Commun. 10, No. 6, 1137-1163 (2018). MSC: 94A60 68P25 62P99 PDF BibTeX XML Cite \textit{S. Samajder} and \textit{P. Sarkar}, Cryptogr. Commun. 10, No. 6, 1137--1163 (2018; Zbl 1419.94046) Full Text: DOI
Ankele, Ralph; List, Eik Differential cryptanalysis of round-reduced Sparx-64/128. (English) Zbl 1440.94028 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 459-475 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Ankele} and \textit{E. List}, Lect. Notes Comput. Sci. 10892, 459--475 (2018; Zbl 1440.94028) Full Text: DOI
Dwivedi, Ashutosh Dhar; Morawiecki, Paweł; Singh, Rajani; Dhar, Shalini Differential-linear and related key cryptanalysis of round-reduced scream. (English) Zbl 06873278 Inf. Process. Lett. 136, 5-8 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{A. D. Dwivedi} et al., Inf. Process. Lett. 136, 5--8 (2018; Zbl 06873278) Full Text: DOI
Aubry, Yves; Herbaut, Fabien Differential uniformity and second order derivatives for generic polynomials. (English) Zbl 1388.14077 J. Pure Appl. Algebra 222, No. 5, 1095-1110 (2018). Reviewer: Diana Maimut (Bucharest) MSC: 14G50 11T71 94A60 PDF BibTeX XML Cite \textit{Y. Aubry} and \textit{F. Herbaut}, J. Pure Appl. Algebra 222, No. 5, 1095--1110 (2018; Zbl 1388.14077) Full Text: DOI
Kölbl, Stefan; Roy, Arnab A brief comparison of SIMON and SIMECK. (English) Zbl 1412.94187 Bogdanov, Andrey (ed.), Lightweight cryptography for security and privacy. 5th international workshop, LightSec 2016, Aksaray, Turkey, September 21–22, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10098, 69-88 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Kölbl} and \textit{A. Roy}, Lect. Notes Comput. Sci. 10098, 69--88 (2017; Zbl 1412.94187) Full Text: DOI
Karakoç, Ferhat; Sağdıçoğlu, Öznur Mut; Gönen, Mehmet Emin; Ersoy, Oğuzhan Impossible differential cryptanalysis of 16/18-round Khudra. (English) Zbl 1412.94182 Bogdanov, Andrey (ed.), Lightweight cryptography for security and privacy. 5th international workshop, LightSec 2016, Aksaray, Turkey, September 21–22, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10098, 33-44 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{F. Karakoç} et al., Lect. Notes Comput. Sci. 10098, 33--44 (2017; Zbl 1412.94182) Full Text: DOI
Lallemand, Virginie; Rasoolzadeh, Shahram Differential cryptanalysis of 18-round PRIDE. (English) Zbl 1429.94062 Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 126-146 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Lallemand} and \textit{S. Rasoolzadeh}, Lect. Notes Comput. Sci. 10698, 126--146 (2017; Zbl 1429.94062) Full Text: DOI
Chen, Lei; Ma, Bing; Zhao, Xiaohong; Wang, Shihong Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. (English) Zbl 1384.94043 Nonlinear Dyn. 87, No. 3, 1797-1807 (2017). MSC: 94A60 37D45 94A08 PDF BibTeX XML Cite \textit{L. Chen} et al., Nonlinear Dyn. 87, No. 3, 1797--1807 (2017; Zbl 1384.94043) Full Text: DOI
Samajder, Subhabrata; Sarkar, Palash Rigorous upper bounds on data complexities of block cipher cryptanalysis. (English) Zbl 1372.94439 J. Math. Cryptol. 11, No. 3, 147-175 (2017). MSC: 94A60 62P99 PDF BibTeX XML Cite \textit{S. Samajder} and \textit{P. Sarkar}, J. Math. Cryptol. 11, No. 3, 147--175 (2017; Zbl 1372.94439) Full Text: DOI
Stevens, Marc; Bursztein, Elie; Karpman, Pierre; Albertini, Ange; Markov, Yarik The first collision for full SHA-1. (English) Zbl 1407.94153 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 570-596 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Stevens} et al., Lect. Notes Comput. Sci. 10401, 570--596 (2017; Zbl 1407.94153) Full Text: DOI
Todo, Yosuke; Isobe, Takanori; Hao, Yonglin; Meier, Willi Cube attacks on non-blackbox polynomials based on division property. (English) Zbl 1406.94081 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-63696-2/pbk; 978-3-319-63697-9/ebook). Lecture Notes in Computer Science 10403, 250-279 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Todo} et al., Lect. Notes Comput. Sci. 10403, 250--279 (2017; Zbl 1406.94081) Full Text: DOI
Todo, Yosuke Division property: efficient method to estimate upper bound of algebraic degree. (English) Zbl 1410.94111 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 553-571 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Todo}, Lect. Notes Comput. Sci. 10311, 553--571 (2017; Zbl 1410.94111) Full Text: DOI
Volte, Emmanuel; Nachef, Valérie; Marrière, Nicolas Improvements of attacks on various Feistel schemes. (English) Zbl 1410.94112 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 321-344 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Volte} et al., Lect. Notes Comput. Sci. 10311, 321--344 (2017; Zbl 1410.94112) Full Text: DOI
Blondeau, Céline; Leander, Gregor; Nyberg, Kaisa Differential-linear cryptanalysis revisited. (English) Zbl 1377.94038 J. Cryptology 30, No. 3, 859-888 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Blondeau} et al., J. Cryptology 30, No. 3, 859--888 (2017; Zbl 1377.94038) Full Text: DOI
Watanabe, Yuhei; Isobe, Takanori; Morii, Masakatu Conditional differential cryptanalysis for Kreyvium. (English) Zbl 1416.94060 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10342, 421-434 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Watanabe} et al., Lect. Notes Comput. Sci. 10342, 421--434 (2017; Zbl 1416.94060) Full Text: DOI
Tjuawinata, Ivan; Huang, Tao; Wu, Hongjun Cryptanalysis of Simpira v2. (English) Zbl 1416.94058 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10342, 384-401 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Tjuawinata} et al., Lect. Notes Comput. Sci. 10342, 384--401 (2017; Zbl 1416.94058) Full Text: DOI
Tolba, Mohamed; Abdelkhalek, Ahmed; Youssef, Amr M. Impossible differential cryptanalysis of reduced-round SKINNY. (English) Zbl 1408.94969 Joye, Marc (ed.) et al., Progress in cryptology – AFRICACRYPT 2017. 9th international conference on cryptology in Africa, Dakar, Senegal, May 24–26, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10239, 117-134 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Tolba} et al., Lect. Notes Comput. Sci. 10239, 117--134 (2017; Zbl 1408.94969) Full Text: DOI
Hadian Dehkordi, Massoud; Taghizadeh, Roghayeh Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256. (English) Zbl 1364.94540 J. Math. Cryptol. 11, No. 2, 55-62 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Hadian Dehkordi} and \textit{R. Taghizadeh}, J. Math. Cryptol. 11, No. 2, 55--62 (2017; Zbl 1364.94540) Full Text: DOI
Hao, Yonglin; Meier, Willi Truncated differential based known-key attacks on round-reduced SIMON. (English) Zbl 1398.94121 Des. Codes Cryptography 83, No. 2, 467-492 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Hao} and \textit{W. Meier}, Des. Codes Cryptography 83, No. 2, 467--492 (2017; Zbl 1398.94121) Full Text: DOI
Arroyo, David; Hernandez, Fernando; Orúe, Amalia B. Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features. (English) Zbl 1358.94055 Int. J. Bifurcation Chaos Appl. Sci. Eng. 27, No. 1, Article ID 1750004, 12 p. (2017). MSC: 94A60 34D06 81P94 PDF BibTeX XML Cite \textit{D. Arroyo} et al., Int. J. Bifurcation Chaos Appl. Sci. Eng. 27, No. 1, Article ID 1750004, 12 p. (2017; Zbl 1358.94055) Full Text: DOI
Minier, Marine Improving impossible-differential attacks against Rijndael-160 and Rijndael-224. (English) Zbl 1366.94516 Des. Codes Cryptography 82, No. 1-2, 117-129 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Minier}, Des. Codes Cryptography 82, No. 1--2, 117--129 (2017; Zbl 1366.94516) Full Text: DOI
Sălăgean, Ana; Mandache-Sălăgean, Matei Counting and characterising functions with “fast points” for differential attacks. (English) Zbl 1362.94050 Cryptogr. Commun. 9, No. 2, 217-239 (2017). MSC: 94A60 11T06 PDF BibTeX XML Cite \textit{A. Sălăgean} and \textit{M. Mandache-Sălăgean}, Cryptogr. Commun. 9, No. 2, 217--239 (2017; Zbl 1362.94050) Full Text: DOI
Gorodilova, A. A. From cryptanalysis to cryptographic property of a Boolean function. (Russian. English summary) Zbl 07310345 Prikl. Diskretn. Mat. 2016, No. 3(33), 16-44 (2016). MSC: 94 68 PDF BibTeX XML Cite \textit{A. A. Gorodilova}, Prikl. Diskretn. Mat. 2016, No. 3(33), 16--44 (2016; Zbl 07310345) Full Text: DOI MNR
Yang, Qianqian; Hu, Lei; Sun, Siwei; Song, Ling Related-key impossible differential analysis of full Khudra. (English) Zbl 1398.68153 Ogawa, Kazuto (ed.) et al., Advances in information and computer security. 11th international workshop on security, IWSEC 2016, Tokyo, Japan, September 12–14, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44523-6/pbk; 978-3-319-44524-3/ebook). Lecture Notes in Computer Science 9836, 135-146 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Q. Yang} et al., Lect. Notes Comput. Sci. 9836, 135--146 (2016; Zbl 1398.68153) Full Text: DOI
Tolba, Mohamed; Abdelkhalek, Ahmed; Youssef, Amr M. Truncated and multiple differential cryptanalysis of reduced round Midori128. (English) Zbl 1397.94104 Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 3-17 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Tolba} et al., Lect. Notes Comput. Sci. 9866, 3--17 (2016; Zbl 1397.94104) Full Text: DOI
Derbez, Patrick Note on impossible differential attacks. (English) Zbl 1387.94079 Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 416-427 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Derbez}, Lect. Notes Comput. Sci. 9783, 416--427 (2016; Zbl 1387.94079) Full Text: DOI
Lin, Li; Wu, Wenling; Zheng, Yafei Automatic search for key-bridging technique: applications to LBlock and TWINE. (English) Zbl 1387.94089 Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 247-267 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Lin} et al., Lect. Notes Comput. Sci. 9783, 247--267 (2016; Zbl 1387.94089) Full Text: DOI
Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex Design strategies for ARX with provable bounds: Sparx and LAX. (English) Zbl 1384.94055 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 484-513 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Dinu} et al., Lect. Notes Comput. Sci. 10031, 484--513 (2016; Zbl 1384.94055) Full Text: DOI
Grassi, Lorenzo; Rechberger, Christian Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE. (English) Zbl 1411.94064 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 322-342 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Grassi} and \textit{C. Rechberger}, Lect. Notes Comput. Sci. 10095, 322--342 (2016; Zbl 1411.94064) Full Text: DOI
Alekseychuk, A. N.; Kovalchuk, L. V.; Shevtsov, A. S.; Yakovliev, S. V. Cryptographic properties of a new national encryption standard of Ukraine. (English. Russian original) Zbl 1391.94722 Cybern. Syst. Anal. 52, No. 3, 351-364 (2016); translation from Kibern. Sist. Anal. 2016, No. 3, 16-31 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{A. N. Alekseychuk} et al., Cybern. Syst. Anal. 52, No. 3, 351--364 (2016; Zbl 1391.94722); translation from Kibern. Sist. Anal. 2016, No. 3, 16--31 (2016) Full Text: DOI
Derbez, Patrick; Fouque, Pierre-Alain Automatic search of meet-in-the-middle and impossible differential attacks. (English) Zbl 1372.94422 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 157-184 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Derbez} and \textit{P.-A. Fouque}, Lect. Notes Comput. Sci. 9815, 157--184 (2016; Zbl 1372.94422) Full Text: DOI
Beierle, Christof Pen and paper arguments for SIMON and SIMON-like designs. (English) Zbl 06641767 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 431-446 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{C. Beierle}, Lect. Notes Comput. Sci. 9841, 431--446 (2016; Zbl 06641767) Full Text: DOI
Yin, Qing; Wang, Nianping Security evaluation for Piccolo structure against differential and linear cryptanalysis. (Chinese. English summary) Zbl 1363.94075 J. Shandong Univ., Nat. Sci. 51, No. 3, 132-142 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{Q. Yin} and \textit{N. Wang}, J. Shandong Univ., Nat. Sci. 51, No. 3, 132--142 (2016; Zbl 1363.94075) Full Text: DOI
Leurent, Gaëtan Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. (English) Zbl 1384.94079 Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 344-371 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Leurent}, Lect. Notes Comput. Sci. 9665, 344--371 (2016; Zbl 1384.94079) Full Text: DOI
Qin, Lingyue; Chen, Huaifeng; Wang, Xiaoyun Linear hull attack on round-reduced Simeck with dynamic key-guessing techniques. (English) Zbl 1346.94121 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 409-424 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Qin} et al., Lect. Notes Comput. Sci. 9723, 409--424 (2016; Zbl 1346.94121) Full Text: DOI
Song, Ling; Huang, Zhangjie; Yang, Qianqian Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. (English) Zbl 1346.94124 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 379-394 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Song} et al., Lect. Notes Comput. Sci. 9723, 379--394 (2016; Zbl 1346.94124) Full Text: DOI
Cheng, Ling; Zhang, Wentao; Xiang, Zejun A new cryptographic analysis of 4-bit S-boxes. (English) Zbl 1409.94865 Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 144-164 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Cheng} et al., Lect. Notes Comput. Sci. 9589, 144--164 (2016; Zbl 1409.94865) Full Text: DOI
Samajder, Subhabrata; Sarkar, Palash Another look at normal approximations in cryptanalysis. (English) Zbl 1408.94962 J. Math. Cryptol. 10, No. 2, Article ID jmc-2016-0006, 69-99 (2016). MSC: 94A60 11T71 68P25 62P99 PDF BibTeX XML Cite \textit{S. Samajder} and \textit{P. Sarkar}, J. Math. Cryptol. 10, No. 2, Article ID jmc-2016--0006, 69--99 (2016; Zbl 1408.94962) Full Text: DOI
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian Forgery attacks on round-reduced ICEPOLE-128. (English) Zbl 1396.94072 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 479-492 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Dobraunig} et al., Lect. Notes Comput. Sci. 9566, 479--492 (2016; Zbl 1396.94072) Full Text: DOI
Leurent, Gaëtan Differential forgery attack against LAC. (English) Zbl 1396.94088 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 217-224 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Leurent}, Lect. Notes Comput. Sci. 9566, 217--224 (2016; Zbl 1396.94088) Full Text: DOI
Canteaut, Anne; Lallemand, Virginie; Naya-Plasencia, María Related-key attack on full-round PICARO. (English) Zbl 1396.94065 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 86-101 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Canteaut} et al., Lect. Notes Comput. Sci. 9566, 86--101 (2016; Zbl 1396.94065) Full Text: DOI
Wang, Ning; Wang, Xiaoyun; Jia, Keting Improved impossible differential attack on reduced-round LBlock. (English) Zbl 1352.94068 Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 136-152 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Wang} et al., Lect. Notes Comput. Sci. 9558, 136--152 (2016; Zbl 1352.94068) Full Text: DOI
Courtois, Nicolas T. An improved differential attack on full GOST. (English) Zbl 1405.94054 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 282-303 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{N. T. Courtois}, Lect. Notes Comput. Sci. 9100, 282--303 (2016; Zbl 1405.94054) Full Text: DOI
Banik, Subhadeep Conditional differential cryptanalysis of 105 round Grain v1. (English) Zbl 1344.94029 Cryptogr. Commun. 8, No. 1, 113-137 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Banik}, Cryptogr. Commun. 8, No. 1, 113--137 (2016; Zbl 1344.94029) Full Text: DOI
Guo, Chun; Zhang, Hailong; Lin, Dongdai Estimating differential-linear distinguishers and applications to CTC2. (English) Zbl 1403.94060 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 220-234 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Guo} et al., Lect. Notes Comput. Sci. 9065, 220--234 (2015; Zbl 1403.94060) Full Text: DOI
AlTawy, Riham; Youssef, Amr M. Differential fault analysis of streebog. (English) Zbl 1403.94040 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 35-49 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} and \textit{A. M. Youssef}, Lect. Notes Comput. Sci. 9065, 35--49 (2015; Zbl 1403.94040) Full Text: DOI
Sun, Siwei; Hu, Lei; Qiao, Kexin; Ma, Xiaoshuang; Shan, Jinyong; Song, Ling Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s. (English) Zbl 1398.94167 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 97-111 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Sun} et al., Lect. Notes Comput. Sci. 9241, 97--111 (2015; Zbl 1398.94167) Full Text: DOI
Sun, Siwei; Hu, Lei; Wang, Meiqin; Yang, Qianqian; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling; Shan, Jinyong Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis. (English) Zbl 1397.94099 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 141-157 (2015). MSC: 94A60 90C11 PDF BibTeX XML Cite \textit{S. Sun} et al., Lect. Notes Comput. Sci. 9290, 141--157 (2015; Zbl 1397.94099) Full Text: DOI
Courtois, Nicolas T.; Mourouzis, Theodosis; Grocholewska-Czuryło, Anna; Quisquater, Jean-Jacques On optimal size in truncated differential attacks. (English) Zbl 1374.94781 Stud. Sci. Math. Hung. 52, No. 2, 246-256 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{N. T. Courtois} et al., Stud. Sci. Math. Hung. 52, No. 2, 246--256 (2015; Zbl 1374.94781) Full Text: DOI
Yap, Wun-She; Phan, Raphael C.-W.; Yau, Wei-Chuen; Heng, Swee-Huay Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. (English) Zbl 1351.94073 Nonlinear Dyn. 80, No. 3, 1483-1491 (2015). MSC: 94A60 37D45 94A08 PDF BibTeX XML Cite \textit{W.-S. Yap} et al., Nonlinear Dyn. 80, No. 3, 1483--1491 (2015; Zbl 1351.94073) Full Text: DOI
Canteaut, Anne; Roué, Joëlle Extended differential properties of cryptographic functions. (English) Zbl 1348.94035 Kyureghyan, Gohar (ed.) et al., Topics in finite fields. 11th international conference on finite fields and their applications (Fq11), Magdeburg, Germany, July 22–26, 2013. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-9860-4/pbk; 978-1-4704-2220-2/ebook). Contemporary Mathematics 632, 43-70 (2015). MSC: 94A60 06E30 11T71 PDF BibTeX XML Cite \textit{A. Canteaut} and \textit{J. Roué}, Contemp. Math. 632, 43--70 (2015; Zbl 1348.94035) Full Text: DOI
Liu, Guoqiang; Jin, Chenhui New upper bound on the maximum differential probability for SPS structure with P-box using \(n\)-MDS. (Chinese. English summary) Zbl 1349.94127 J. Softw. 26, No. 10, 2656-2666 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Liu} and \textit{C. Jin}, J. Softw. 26, No. 10, 2656--2666 (2015; Zbl 1349.94127) Full Text: DOI
Beierle, Christof; Jovanovic, Philipp; Lauridsen, Martin M.; Leander, Gregor; Rechberger, Christian Analyzing permutations for AES-like ciphers: understanding shiftrows. (English) Zbl 1382.94060 Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 37-58 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Beierle} et al., Lect. Notes Comput. Sci. 9048, 37--58 (2015; Zbl 1382.94060) Full Text: DOI
Mourouzis, Theodosis; Courtois, Nicolas Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers. (English) Zbl 1395.94304 Tatra Mt. Math. Publ. 64, 217-231 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Mourouzis} and \textit{N. Courtois}, Tatra Mt. Math. Publ. 64, 217--231 (2015; Zbl 1395.94304) Full Text: DOI
Blondeau, Céline; Peyrin, Thomas; Wang, Lei Known-key distinguisher on full \(\mathtt{PRESENT}\). (English) Zbl 1375.94104 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 455-474 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Blondeau} et al., Lect. Notes Comput. Sci. 9215, 455--474 (2015; Zbl 1375.94104) Full Text: DOI
Kölbl, Stefan; Leander, Gregor; Tiessen, Tyge Observations on the SIMON block cipher family. (English) Zbl 1369.94546 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 161-185 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Kölbl} et al., Lect. Notes Comput. Sci. 9215, 161--185 (2015; Zbl 1369.94546) Full Text: DOI
Bao, Zhenzhen; Zhang, Wentao; Lin, Dongdai Speeding up the search algorithm for the best differential and best linear trails. (English) Zbl 1400.94115 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 259-285 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{Z. Bao} et al., Lect. Notes Comput. Sci. 8957, 259--285 (2015; Zbl 1400.94115) Full Text: DOI
Lu, Jiqiang A methodology for differential-linear cryptanalysis and its applications. (English) Zbl 1347.94051 Des. Codes Cryptography 77, No. 1, 11-48 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Lu}, Des. Codes Cryptography 77, No. 1, 11--48 (2015; Zbl 1347.94051) Full Text: DOI
Bar-On, Achiya; Dinur, Itai; Dunkelman, Orr; Lallemand, Virginie; Keller, Nathan; Tsaban, Boaz Cryptanalysis of SP networks with partial non-linear layers. (English) Zbl 1370.94484 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 315-342 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Bar-On} et al., Lect. Notes Comput. Sci. 9056, 315--342 (2015; Zbl 1370.94484) Full Text: DOI
Canteaut, Anne; Roué, Joëlle On the behaviors of affine equivalent Sboxes regarding differential and linear attacks. (English) Zbl 1365.94411 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 45-74 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Canteaut} and \textit{J. Roué}, Lect. Notes Comput. Sci. 9056, 45--74 (2015; Zbl 1365.94411) Full Text: DOI
Abdelkhalek, Ahmed; AlTawy, Riham; Youssef, Amr M. Impossible differential properties of reduced round Streebog. (English) Zbl 1441.94065 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 274-286 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Abdelkhalek} et al., Lect. Notes Comput. Sci. 9084, 274--286 (2015; Zbl 1441.94065) Full Text: DOI
Canteaut, Anne; Roué, Joëlle Differential attacks against SPN: a thorough analysis. (English) Zbl 1328.94061 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 45-62 (2015). MSC: 94A60 94B05 PDF BibTeX XML Cite \textit{A. Canteaut} and \textit{J. Roué}, Lect. Notes Comput. Sci. 9084, 45--62 (2015; Zbl 1328.94061) Full Text: DOI
AlTawy, Riham; Youssef, Amr Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock. (English) Zbl 1382.94039 Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 126-139 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{R. AlTawy} and \textit{A. Youssef}, Lect. Notes Comput. Sci. 8898, 126--139 (2015; Zbl 1382.94039) Full Text: DOI
Zhang, Wentao; Bao, Zhenzhen; Rijmen, Vincent; Liu, Meicheng A new classification of 4-bit optimal S-boxes and its application to PRESENT, RECTANGLE and SPONGENT. (English) Zbl 1382.94172 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 494-515 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Zhang} et al., Lect. Notes Comput. Sci. 9054, 494--515 (2015; Zbl 1382.94172) Full Text: DOI
Huang, Tao; Tjuawinata, Ivan; Wu, Hongjun Differential-linear cryptanalysis of ICEPOLE. (English) Zbl 1367.94317 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 243-263 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Huang} et al., Lect. Notes Comput. Sci. 9054, 243--263 (2015; Zbl 1367.94317) Full Text: DOI
Blondeau, Céline; Bay, Aslı; Vaudenay, Serge Protecting against multidimensional linear and truncated differential cryptanalysis by decorrelation. (English) Zbl 1367.94301 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 73-91 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Blondeau} et al., Lect. Notes Comput. Sci. 9054, 73--91 (2015; Zbl 1367.94301) Full Text: DOI
Li, Leibo; Jia, Keting; Wang, Xiaoyun; Dong, Xiaoyang Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia. (English) Zbl 1367.94327 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 48-70 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Li} et al., Lect. Notes Comput. Sci. 9054, 48--70 (2015; Zbl 1367.94327) Full Text: DOI