-
1
-
2
Understanding the Duplex and Its Security
Published 2023-06-01“…The construction was generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). Daemen et al. (ASIACRYPT 2017) generalized it further to cover much more use cases, and proved security of this general construction, and Dobraunig and Mennink (ASIACRYPT 2019) derived a leakage resilience security bound for this construction. …”
Get full text
Article -
3
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption
Published 2020“…As introduced by Kiayias, Tsiounis and Yung (Asiacrypt’07), GE is motivated by applications in the context of oblivious retriever storage systems, anonymous third parties and hierarchical group signatures. …”
Get full text
Conference Paper -
4
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…To achieve the goal, the Coron and Notarnicola (Asiacrypt’19) algorithm is applied. However, because of parameter issues, the algorithm cannot be used directly. …”
Get full text
Article -
5
Integral Cryptanalysis Using Algebraic Transition Matrices
Published 2023-12-01“… In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016). …”
Get full text
Article -
6
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Published 2021-11-01“…The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by Beyne et al. at Asiacrypt 2020. The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency. …”
Get full text
Article -
7
Lossy CSI-FiSh: Efficient signature scheme with tight reduction to decisional CSIDH-512
Published 2020“…Recently, Beullens, Kleinjung, and Vercauteren (Asiacrypt'19) provided the first practical isogeny-based digital signature, obtained from the Fiat-Shamir (FS) paradigm. …”
Conference item -
8
MILP-Based Differential Cryptanalysis on Round-Reduced Midori64
Published 2020-01-01“…Mixed integer linear programming (MILP) model was presented by Sun <italic>et al.</italic> at Asiacrypt 2014 to search for differential characteristics of block ciphers. …”
Get full text
Article -
9
-
10
New results on modular inversion hidden number problem and inversive congruential generator
Published 2020“…The Modular Inversion Hidden Number Problem (MIHNP), introduced by Boneh, Halevi and Howgrave-Graham in Asiacrypt 2001, is briefly described as follows: Let MSB𝛿(𝑧) refer to the δ most significant bits of z. …”
Get full text
Conference Paper -
11
A Single-Key Variant of LightMAC_Plus
Published 2021-09-01“…LightMAC_Plus proposed by Naito (ASIACRYPT 2017) is a blockcipher-based MAC that has beyond the birthday bound security without message length in the sense of PRF (Pseudo-Random Function) security. …”
Get full text
Article -
12
Towards closing the security gap of Tweak-aNd-Tweak (TNT)
Published 2021Get full text
Conference Paper -
13
-
14
Revisiting modular inversion hidden number problem and its applications
Published 2023“…The Modular Inversion Hidden Number Problem (MIHNP), which was proposed at Asiacrypt 2001 by Boneh, Halevi, and Howgrave-Graham, is summarized as follows: Assume that the δ most significant bits of z are denoted by MSBδ(z). …”
Get full text
Journal Article -
15
Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation
Published 2020-08-01“…We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). …”
Get full text
Article -
16
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics
Published 2021-07-01“…TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bourse et al. presented the actual form of the scheme in CRYPTO’ 2018. …”
Get full text
Article -
17
A new distinguishing attack on reduced round ChaCha permutation
Published 2023-08-01“…(in: Advances in Cryptology—ASIACRYPT 2022—28nd International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2012, Springer, 2022), which achieved time complexity $$2^{214}$$ 2 214 . …”
Get full text
Article -
18
-
19
The Deoxys AEAD family
Published 2022“…Deoxys uses a new family of tweakable block ciphers as internal primitive, Deoxys-TBC, which follows the TWEAKEY framework (Jean, Nikolić, and Peyrin, ASIACRYPT 2014) and relies on the AES round function. …”
Get full text
Journal Article -
20
Weak-keys and key-recovery attack for $$\text{ TinyJAMBU }$$ TinyJAMBU
Published 2022-09-01“…Finally, we give new key-recovery attacks against $$\text{ TinyJAMBU }$$ TinyJAMBU using the concepts of monomial trail presented by Hu et al. at ASIACRYPT 2020. Our attacks are unlikely to jeopardise the security of the entire 640 rounds $$\text{ TinyJAMBU }$$ TinyJAMBU , but we strongly anticipate that they will shed new lights on the cipher’s security.…”
Get full text
Article