Showing 1 - 20 results of 39 for search '"Asiacrypt"', query time: 0.08s Refine Results
  1. 1

    Understanding the Duplex and Its Security by Bart Mennink

    Published 2023-06-01
    “…The construction was generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). Daemen et al. (ASIACRYPT 2017) generalized it further to cover much more use cases, and proved security of this general construction, and Dobraunig and Mennink (ASIACRYPT 2019) derived a leakage resilience security bound for this construction. …”
    Get full text
    Article
  2. 2

    Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map by Jiseung Kim, Changmin Lee

    Published 2022-05-01
    “…To achieve the goal, the Coron and Notarnicola (Asiacrypt’19) algorithm is applied. However, because of parameter issues, the algorithm cannot be used directly. …”
    Get full text
    Article
  3. 3

    Integral Cryptanalysis Using Algebraic Transition Matrices by Tim Beyne, Michiel Verbauwhede

    Published 2023-12-01
    “… In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016). …”
    Get full text
    Article
  4. 4

    Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency by Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi

    Published 2021-11-01
    “…The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by Beyne et al. at Asiacrypt 2020. The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency. …”
    Get full text
    Article
  5. 5

    MILP-Based Differential Cryptanalysis on Round-Reduced Midori64 by Hongluan Zhao, Guoyong Han, Letian Wang, Wen Wang

    Published 2020-01-01
    “…Mixed integer linear programming (MILP) model was presented by Sun <italic>et al.</italic> at Asiacrypt 2014 to search for differential characteristics of block ciphers. …”
    Get full text
    Article
  6. 6

    A Single-Key Variant of LightMAC_Plus by Haitao Song

    Published 2021-09-01
    “…LightMAC_Plus proposed by Naito (ASIACRYPT 2017) is a blockcipher-based MAC that has beyond the birthday bound security without message length in the sense of PRF (Pseudo-Random Function) security. …”
    Get full text
    Article
  7. 7

    Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation by Milica Knežević, Siniša Tomović, Miodrag J. Mihaljević

    Published 2020-08-01
    “…We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). …”
    Get full text
    Article
  8. 8

    Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics by Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid

    Published 2021-07-01
    “…TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bourse et al. presented the actual form of the scheme in CRYPTO’ 2018. …”
    Get full text
    Article
  9. 9

    A new distinguishing attack on reduced round ChaCha permutation by Chandan Dey, Santanu Sarkar

    Published 2023-08-01
    “…(in: Advances in Cryptology—ASIACRYPT 2022—28nd International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2012, Springer, 2022), which achieved time complexity $$2^{214}$$ 2 214 . …”
    Get full text
    Article
  10. 10

    Weak-keys and key-recovery attack for $$\text{ TinyJAMBU }$$ TinyJAMBU by Pranjal Dutta, Mahesh Sreekumar Rajasree, Santanu Sarkar

    Published 2022-09-01
    “…Finally, we give new key-recovery attacks against $$\text{ TinyJAMBU }$$ TinyJAMBU using the concepts of monomial trail presented by Hu et al. at ASIACRYPT 2020. Our attacks are unlikely to jeopardise the security of the entire 640 rounds $$\text{ TinyJAMBU }$$ TinyJAMBU , but we strongly anticipate that they will shed new lights on the cipher’s security.…”
    Get full text
    Article
  11. 11

    Enhancing the Key Recovery Attack on Round Reduced Salsa by Chandan Dey, Sabyasachi Dey, Rahul Girme, Santanu Sarkar

    Published 2024-01-01
    “…Our attack complexity is <inline-formula> <tex-math notation="LaTeX">$2^{210.38}$ </tex-math></inline-formula>, which is an improvement of the latest work at ASIACRYPT 2022. We also revisit the work of Ghafoori et al. …”
    Get full text
    Article
  12. 12

    Quantum‐resistant anonymous identity‐based encryption with trable identities by Zi‐Yuan Liu, Yi‐Fan Tseng, Raylin Tso, Masahiro Mambo, Yu‐Chi Chen

    Published 2022-03-01
    “…Finally, we apply this concept to Katsumata and Yamada's compact anonymous IBE scheme (Asiacrypt '16) to obtain the first quantum‐resistant AIBET scheme that is adaptively secure under the ring learning with errors assumption without random oracle.…”
    Get full text
    Article
  13. 13

    Fault attacks on authenticated encryption modes for GIFT by Shuai Liu, Jie Guan, Bin Hu

    Published 2022-01-01
    “…First, the fault attack on the nonce‐based authenticated encryption mode LOTUS/LOCUS is presented. At Asiacrypt2016, Dobraunig et al. showed the first fault attacks on several nonce‐based authenticated encryption modes. …”
    Get full text
    Article
  14. 14

    Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos by Mostafizar Rahman, Dhiman Saha, Goutam Paul

    Published 2021-09-01
    “…This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017. In doing so, the s-box switch and ladder switch techniques are leveraged to embed a yoyo trail inside a boomerang trail. …”
    Get full text
    Article
  15. 15

    Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited by Huiwen Jia, Yupu Hu, Chunming Tang

    Published 2022-01-01
    “…Abstract For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample short preimages approximately from a discrete Gaussian distribution. …”
    Get full text
    Article
  16. 16

    Improved integral cryptanalysis of SPNbox in digital rights management systems by Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang

    Published 2023-01-01
    “…SPNbox, proposed at Asiacrypt’16 is such a white‐box cipher that fulfils comprehensive resistance against key exposure for digital rights management systems, including black‐box security on the server‐side and white‐box security on the client‐side. …”
    Get full text
    Article
  17. 17

    LPN-based Attacks in the White-box Setting by Alex Charlès, Aleksei Udovenko

    Published 2023-08-01
    “…However, recent quadratic and cubic masking schemes by Biryukov-Udovenko (ASIACRYPT 2018) and Seker-Eisenbarth-Liskiewicz (CHES 2021) prevent LDA and force to use its higher-degree generalizations with much higher complexity. …”
    Get full text
    Article
  18. 18

    Provable Secure Parallel Gadgets by Francesco Berti, Sebastian Faust, Maximilian Orlt

    Published 2023-08-01
    “…Recently, Dziembowski, Faust, and Zebrowski (ASIACRYPT’19) analyzed the security of a simple refreshing gadget by using a new technique called the leakage diagram. …”
    Get full text
    Article
  19. 19

    Secure Message Authentication in the Presence of Leakage and Faults by Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert

    Published 2023-03-01
    “…We then show that a MAC from Asiacrypt 2021 natively enables a leveled implementation for fault resilience where only its underlying tweakable block cipher must be protected, if only the tag verification can be faulted. …”
    Get full text
    Article
  20. 20

    Meet-in-the-middle differential fault analysis on Midori by Chunyan An, Wei Bai, Donglei Zhang

    Published 2023-10-01
    “…Midori is a lightweight block cipher designed by Banik et al. and presented at the ASIACRYPT 2015 conference. According to the block size, it consists of two algorithms, denoted as Midori-64 and Midori-128. …”
    Get full text
    Article