Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose two new techniques for the integral attack, the FFT technique and the key concealment technique. The FFT technique is useful for the integral attack with enormous chosen plaintexts. As the previous result using FFT, Collard et al. showed a new technique which reduces the complexity for the linear attack. In this paper, we review the result of Collard et al. to estimate the complexity in detail, and we show the complexity can be estimated from the number of times using the addition of integers. Moreover, we show that attacks using FFT can be applied to the integral attack. As applications, we show integral attacks against AES and...
International audienceFlexAEAD is a block cipher candidate submitted to the NIST Lightweight Cryptog...
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is ba...
In this paper, we present a key-recovery attack on the online authenticated encryption scheme McOE-X...
Integral attacks are well-known to be effective against byte-based block ciphers. In this document, ...
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to...
Abstract. We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed at...
Abstract. How does the security of the AES change when the S-box is replaced by a secret S-box, abou...
The current paper presents an integral cryptanalysis in the single-key setting against light-weight ...
Abstract. MISTY1 is a block cipher designed by Matsui in 1997. It was well evaluated and standardize...
International audienceIn this paper, we revisit meet-in-the-middle attacks on AES in the single-key ...
The partial sums cryptanalytic technique was introduced in 2000 by Ferguson et al., who used it to b...
<p>ABSTRACT</p> <p>Integral attack is a powerful method to recover the secret key of block cipher b...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
International audienceFlexAEAD is a block cipher candidate submitted to the NIST Lightweight Cryptog...
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is ba...
In this paper, we present a key-recovery attack on the online authenticated encryption scheme McOE-X...
Integral attacks are well-known to be effective against byte-based block ciphers. In this document, ...
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to...
Abstract. We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed at...
Abstract. How does the security of the AES change when the S-box is replaced by a secret S-box, abou...
The current paper presents an integral cryptanalysis in the single-key setting against light-weight ...
Abstract. MISTY1 is a block cipher designed by Matsui in 1997. It was well evaluated and standardize...
International audienceIn this paper, we revisit meet-in-the-middle attacks on AES in the single-key ...
The partial sums cryptanalytic technique was introduced in 2000 by Ferguson et al., who used it to b...
<p>ABSTRACT</p> <p>Integral attack is a powerful method to recover the secret key of block cipher b...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
International audienceThe majority of current attacks on reduced-round variants of block ciphers see...
International audienceFlexAEAD is a block cipher candidate submitted to the NIST Lightweight Cryptog...
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is ba...
In this paper, we present a key-recovery attack on the online authenticated encryption scheme McOE-X...