UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 65
1.
  • Integral Cryptanalysis on F... Integral Cryptanalysis on Full MISTY1
    Todo, Yosuke Journal of cryptology, 07/2017, Volume: 30, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    MISTY1 is a block cipher designed by Matsui in 1997. It was well evaluated and standardized by projects, such as CRYPTREC, ISO/IEC, and NESSIE. In this paper, we propose a key recovery attack on the ...
Full text

PDF
2.
Full text
3.
  • Nonlinear Invariant Attack:... Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64
    Todo, Yosuke; Leander, Gregor; Sasaki, Yu Journal of cryptology, 10/2019, Volume: 32, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    In this paper, we introduce a new type of attack, called nonlinear invariant attack . As application examples, we present new attacks that are able to distinguish the full versions of the (tweakable) ...
Full text
4.
  • Impossible Differential Att... Impossible Differential Attack against 14-Round Piccolo-80 without Relying on Full Code Book
    TODO, Yosuke IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2016/01/01, 2016-00-00, Volume: E99.A, Issue: 1
    Journal Article
    Peer reviewed

    Piccolo is a lightweight block cipher proposed by Sony Corporation in 2011. The designers showed two key modes, Piccolo-80 and Piccolo-128, which use an 80-bit secret key and a 128-bit one, ...
Full text
5.
  • Cube Attacks on Non-Blackbo... Cube Attacks on Non-Blackbox Polynomials Based on Division Property
    Todo, Yosuke; Isobe, Takanori; Hao, Yonglin ... IEEE transactions on computers, 12/2018, Volume: 67, Issue: 12
    Journal Article
    Peer reviewed

    The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack, the ...
Full text
6.
  • Upper Bounds for the Securi... Upper Bounds for the Security of Several Feistel Networks
    TODO, Yosuke IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015, 2015-00-00, 20150101, Volume: E98.A, Issue: 1
    Journal Article
    Peer reviewed

    In this paper, we deal with upper bounds for the security of some Feistel networks. Such a topic has been discussed since the introduction of Luby-Rackoff construction. The Luby-Rackoff construction ...
Full text
7.
  • Modeling for Three-Subset D... Modeling for Three-Subset Division Property without Unknown Subset
    Hao, Yonglin; Leander, Gregor; Meier, Willi ... Journal of cryptology, 07/2021, Volume: 34, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application to stream ...
Full text

PDF
8.
Full text

PDF
9.
  • Improved Differential-Linea... Improved Differential-Linear Attacks with Applications to ARX Ciphers
    Beierle, Christof; Broll, Marek; Canale, Federico ... Journal of cryptology, 10/2022, Volume: 35, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    We present several improvements to the framework of differential-linear attacks with a special focus on ARX ciphers. As a demonstration of their impact, we apply them to Chaskey and ChaCha and we are ...
Full text
10.
  • Sycon: a new milestone in d... Sycon: a new milestone in designing ASCON-like permutations
    Mandal, Kalikinkar; Saha, Dhiman; Sarkar, Sumanta ... Journal of cryptographic engineering, 2022/9, Volume: 12, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight applications in the CAESAR competition, which also ...
Full text
1 2 3 4 5
hits: 65

Load filters