We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector. Interestingly, subspace trail cryptanalysis in fact includes techniques based on impossible or truncated differentials and integrals as special cases. Choosing AES-128 as the perhaps most studied cipher, we describe distinguishers up to 5-round AES with a single unknown key. We report (and practically verify) competitive key-recovery attacks with very low data-complexity on 2, 3 and 4 rounds of AES. Additionally, we consider AES with a secret S-Box and...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES -- based on the “multiple-of-8”...
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed sy...
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subs...
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subs...
Differential cryptanalysis is about finding trails which involve a low amount of active S-box operat...
Abstract. Invariant subspace attacks were introduced at CRYPTO 2011 to cryptanalyze PRINTcipher. The...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” ...
In this paper, we analyze the security of AES in the case in which the whitening key is a weak key.A...
This thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like bl...
© 2018 Elsevier B.V. Invariant subspace attack is a novel cryptanalytic technique which breaks sever...
In this paper, we present new key-recovery attacks on AES with a single secret S-Box. Several attack...
Motivated by progress in the field of zero-knowledge proofs, so-called Arithmetization-Oriented (AO)...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES -- based on the “multiple-of-8”...
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed sy...
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subs...
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subs...
Differential cryptanalysis is about finding trails which involve a low amount of active S-box operat...
Abstract. Invariant subspace attacks were introduced at CRYPTO 2011 to cryptanalyze PRINTcipher. The...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” ...
In this paper, we analyze the security of AES in the case in which the whitening key is a weak key.A...
This thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like bl...
© 2018 Elsevier B.V. Invariant subspace attack is a novel cryptanalytic technique which breaks sever...
In this paper, we present new key-recovery attacks on AES with a single secret S-Box. Several attack...
Motivated by progress in the field of zero-knowledge proofs, so-called Arithmetization-Oriented (AO)...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES -- based on the “multiple-of-8”...
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed sy...