Abstract. Proving bounds on the expected differential probability (EDP) of a characteristic over all keys has been a popular technique of arguing security for both block ciphers and hash functions. In fact, to a large extent, it was the clear formulation and elegant deployment of this very principle that helped Rijndael win the AES competition. Moreover, most SHA-3 finalists have come with explicit upper bounds on the EDP of a characteristic as a major part of their design rationale. However, despite the pervasiveness of this design approach, there is no understanding of what such bounds actually mean for the security of a primitive once a key is fixed -an essential security question in practice. In this paper, we aim to bridge this fundame...
Impossible differential attacks, which are taking advantage of differentials that cannot occur, are ...
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably ...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
The current paper studies the probability of differential characteristics for an unkeyed (or with a ...
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
Although symmetric key primitives such as block ciphers are ubiquitously deployed throughout all cry...
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remai...
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remai...
In this paper we investigate the differential properties of block ciphers in hash function modes of ...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the securit...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
Abstract. In this paper, we present some new applications of the bounds for the dier-ential probabil...
Cryptographic assumptions and security goals are fundamentally distributional. As a result, statisti...
Impossible differential attacks, which are taking advantage of differentials that cannot occur, are ...
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably ...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...
The current paper studies the probability of differential characteristics for an unkeyed (or with a ...
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
Although symmetric key primitives such as block ciphers are ubiquitously deployed throughout all cry...
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remai...
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remai...
In this paper we investigate the differential properties of block ciphers in hash function modes of ...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the securit...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
Abstract. In this paper, we present some new applications of the bounds for the dier-ential probabil...
Cryptographic assumptions and security goals are fundamentally distributional. As a result, statisti...
Impossible differential attacks, which are taking advantage of differentials that cannot occur, are ...
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably ...
Abstract. Recent advances in block-cipher theory deliver security analyses in models where one or mo...