Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with different performance profiles are appearing. In this article, we explore the use of Constraint Programming (CP) for differential cryptanalysis on the Ascon authenticated encryption family (first choice of the CAESAR lightweight applications portfolio and current finalist of the NIST LWC competition) and its internal permutation. We first present a search methodology for finding differential characteristics for Ascon with CP, which can easily find the best differential characteristics alread...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
International audienceSearch for different types of distinguishers are common tasks in symmetric-key...
Abstract. We present a detailed security analysis of the CAESAR can-didate Ascon. Amongst others, cu...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
Being one of the winners of the CAESAR competition and a finalist of the ongoing NIST lightweight cr...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
International audienceSearch for different types of distinguishers are common tasks in symmetric-key...
Abstract. We present a detailed security analysis of the CAESAR can-didate Ascon. Amongst others, cu...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
Being one of the winners of the CAESAR competition and a finalist of the ongoing NIST lightweight cr...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
International audienceIn this paper, we introduce Constraint Programming (CP) models to solve a cryp...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...