In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of symmetric-key primitives. For differential and linear cryptanalysis, MILP can be used to solve two kinds of problems: calculation of the minimum number of differentially/linearly active S-boxes, and search for the best differential/linear characteristics. There are already numerous papers published in this area. However, the efficiency is not satisfactory enough for many symmetric-key primitives. In this paper, we greatly improve the efficiency of the MILP-based search algorithm for both problems. Each of the two problems for an r-round cipher can be converted to an MILP model whose feasible region is the set of all possible r-round differentia...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...
The inclusion of ChaCha20 and Poly1305 into the list of supported ciphers in TLS 1.3 necessitates a ...
Cette thèse contribue à l’effort de cryptanalyse de primitives symétriques comme les chiffrements pa...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
Mixed integer linear programming (MILP) models are applied extensively in the field of cryptanalysis...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Abstract. In this paper, we propose two systematic methods to describe the differential property of ...
With the widespread use of RFID technology and the rapid development of Internet of Things, the rese...
Abstract. In IACR ePrint 2014/747, a method for constructing mixed-integer linear programming (MILP)...
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to som...
Division property is a cryptanalysis method that proves to be very efficient on block ciphers. Compu...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...
The inclusion of ChaCha20 and Poly1305 into the list of supported ciphers in TLS 1.3 necessitates a ...
Cette thèse contribue à l’effort de cryptanalyse de primitives symétriques comme les chiffrements pa...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
Mixed integer linear programming (MILP) models are applied extensively in the field of cryptanalysis...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Abstract. In this paper, we propose two systematic methods to describe the differential property of ...
With the widespread use of RFID technology and the rapid development of Internet of Things, the rese...
Abstract. In IACR ePrint 2014/747, a method for constructing mixed-integer linear programming (MILP)...
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to som...
Division property is a cryptanalysis method that proves to be very efficient on block ciphers. Compu...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel informatio...
The inclusion of ChaCha20 and Poly1305 into the list of supported ciphers in TLS 1.3 necessitates a ...
Cette thèse contribue à l’effort de cryptanalyse de primitives symétriques comme les chiffrements pa...