-
1
Understanding the Duplex and Its Security
Published 2023-06-01“…The construction was generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). Daemen et al. (ASIACRYPT 2017) generalized it further to cover much more use cases, and proved security of this general construction, and Dobraunig and Mennink (ASIACRYPT 2019) derived a leakage resilience security bound for this construction. …”
Get full text
Article -
2
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…To achieve the goal, the Coron and Notarnicola (Asiacrypt’19) algorithm is applied. However, because of parameter issues, the algorithm cannot be used directly. …”
Get full text
Article -
3
Integral Cryptanalysis Using Algebraic Transition Matrices
Published 2023-12-01“… In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016). …”
Get full text
Article -
4
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Published 2021-11-01“…The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by Beyne et al. at Asiacrypt 2020. The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency. …”
Get full text
Article -
5
MILP-Based Differential Cryptanalysis on Round-Reduced Midori64
Published 2020-01-01“…Mixed integer linear programming (MILP) model was presented by Sun <italic>et al.</italic> at Asiacrypt 2014 to search for differential characteristics of block ciphers. …”
Get full text
Article -
6
A Single-Key Variant of LightMAC_Plus
Published 2021-09-01“…LightMAC_Plus proposed by Naito (ASIACRYPT 2017) is a blockcipher-based MAC that has beyond the birthday bound security without message length in the sense of PRF (Pseudo-Random Function) security. …”
Get full text
Article -
7
Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation
Published 2020-08-01“…We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). …”
Get full text
Article -
8
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics
Published 2021-07-01“…TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bourse et al. presented the actual form of the scheme in CRYPTO’ 2018. …”
Get full text
Article -
9
A new distinguishing attack on reduced round ChaCha permutation
Published 2023-08-01“…(in: Advances in Cryptology—ASIACRYPT 2022—28nd International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2012, Springer, 2022), which achieved time complexity $$2^{214}$$ 2 214 . …”
Get full text
Article -
10
Weak-keys and key-recovery attack for $$\text{ TinyJAMBU }$$ TinyJAMBU
Published 2022-09-01“…Finally, we give new key-recovery attacks against $$\text{ TinyJAMBU }$$ TinyJAMBU using the concepts of monomial trail presented by Hu et al. at ASIACRYPT 2020. Our attacks are unlikely to jeopardise the security of the entire 640 rounds $$\text{ TinyJAMBU }$$ TinyJAMBU , but we strongly anticipate that they will shed new lights on the cipher’s security.…”
Get full text
Article -
11
Enhancing the Key Recovery Attack on Round Reduced Salsa
Published 2024-01-01“…Our attack complexity is <inline-formula> <tex-math notation="LaTeX">$2^{210.38}$ </tex-math></inline-formula>, which is an improvement of the latest work at ASIACRYPT 2022. We also revisit the work of Ghafoori et al. …”
Get full text
Article -
12
Quantum‐resistant anonymous identity‐based encryption with trable identities
Published 2022-03-01“…Finally, we apply this concept to Katsumata and Yamada's compact anonymous IBE scheme (Asiacrypt '16) to obtain the first quantum‐resistant AIBET scheme that is adaptively secure under the ring learning with errors assumption without random oracle.…”
Get full text
Article -
13
Fault attacks on authenticated encryption modes for GIFT
Published 2022-01-01“…First, the fault attack on the nonce‐based authenticated encryption mode LOTUS/LOCUS is presented. At Asiacrypt2016, Dobraunig et al. showed the first fault attacks on several nonce‐based authenticated encryption modes. …”
Get full text
Article -
14
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
Published 2021-09-01“…This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017. In doing so, the s-box switch and ladder switch techniques are leveraged to embed a yoyo trail inside a boomerang trail. …”
Get full text
Article -
15
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussian distribution. …”
Get full text
Article -
16
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…SPNbox, proposed at Asiacrypt’16 is such a white‐box cipher that fulfils comprehensive resistance against key exposure for digital rights management systems, including black‐box security on the server‐side and white‐box security on the client‐side. …”
Get full text
Article -
17
LPN-based Attacks in the White-box Setting
Published 2023-08-01“…However, recent quadratic and cubic masking schemes by Biryukov-Udovenko (ASIACRYPT 2018) and Seker-Eisenbarth-Liskiewicz (CHES 2021) prevent LDA and force to use its higher-degree generalizations with much higher complexity. …”
Get full text
Article -
18
Provable Secure Parallel Gadgets
Published 2023-08-01“…Recently, Dziembowski, Faust, and Zebrowski (ASIACRYPT’19) analyzed the security of a simple refreshing gadget by using a new technique called the leakage diagram. …”
Get full text
Article -
19
Secure Message Authentication in the Presence of Leakage and Faults
Published 2023-03-01“…We then show that a MAC from Asiacrypt 2021 natively enables a leveled implementation for fault resilience where only its underlying tweakable block cipher must be protected, if only the tag verification can be faulted. …”
Get full text
Article -
20
Meet-in-the-middle differential fault analysis on Midori
Published 2023-10-01“…Midori is a lightweight block cipher designed by Banik et al. and presented at the ASIACRYPT 2015 conference. According to the block size, it consists of two algorithms, denoted as Midori-64 and Midori-128. …”
Get full text
Article