At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” property - has been presented. Although it allows to distinguish a random permutation from an AES-like one, it seems rather hard to implement a key-recovery attack different than brute-force like using such a distinguisher. In this paper we introduce “Mixture Differential Cryptanalysis” on round-reduced AESlike ciphers, a way to translate the (complex) “multiple-of-8” 5-round distinguisher into a simpler and more convenient one (though, on a smaller number of rounds). Given a pair of chosen plaintexts, the idea is to construct new pairs of plaintexts by mixing the generating variables of the original pair of plaintexts. Here we theoretically ...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
In this paper we present truncated differential analysis of reduced-round LBlock by computing the di...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” ...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES -- based on the “multiple-of-8”...
In this paper, we present new key-recovery attacks on AES with a single secret S-Box. Several attack...
In this paper, a new framework is developed for proving and adapting the recently proposed multiple-...
In this paper, we analyze the security of AES in the case in which the whitening key is a weak key.A...
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its ro...
ABSTRACT The majority of the published attacks on reduced-round variants of block ciphers seeks to m...
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. Wit...
In this thesis, we are interested in the cryptanalysis of some symmetric primitives using the struct...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-m...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
In this paper we present truncated differential analysis of reduced-round LBlock by computing the di...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” ...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES -- based on the “multiple-of-8”...
In this paper, we present new key-recovery attacks on AES with a single secret S-Box. Several attack...
In this paper, a new framework is developed for proving and adapting the recently proposed multiple-...
In this paper, we analyze the security of AES in the case in which the whitening key is a weak key.A...
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its ro...
ABSTRACT The majority of the published attacks on reduced-round variants of block ciphers seeks to m...
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. Wit...
In this thesis, we are interested in the cryptanalysis of some symmetric primitives using the struct...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-m...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
In this paper we present truncated differential analysis of reduced-round LBlock by computing the di...