Search Results - "Eichlseder, Maria"
-
1
Integral Cryptanalysis of WARP based on Monomial Prediction
Published in IACR Transactions on Symmetric Cryptology (10-06-2022)“…WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and…”
Get full text
Journal Article -
2
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks
Published in IACR Transactions on Symmetric Cryptology (01-03-2024)“…Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding…”
Get full text
Journal Article -
3
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
Published in IACR Transactions on Symmetric Cryptology (11-03-2022)“…The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for…”
Get full text
Journal Article -
4
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
Published in IACR Transactions on Symmetric Cryptology (06-09-2024)“…The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack:…”
Get full text
Journal Article -
5
Finding Collisions for Round-Reduced Romulus-H
Published in IACR Transactions on Symmetric Cryptology (10-03-2023)“…The hash function Romulus-H is a finalist in the NIST Lightweight Cryptography competition. It is based on the Hirose double block-length (DBL) construction…”
Get full text
Journal Article -
6
Isap v2.0
Published in IACR Transactions on Symmetric Cryptology (22-06-2020)“…We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault…”
Get full text
Journal Article -
7
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Published in IACR transactions on cryptographic hardware and embedded systems (01-08-2018)“…Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been…”
Get full text
Journal Article -
8
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Published in IACR Transactions on Symmetric Cryptology (01-01-2018)“…The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several…”
Get full text
Journal Article -
9
Integrity of virtual testing for crash protection
Published in Frontiers in future transportation (30-11-2022)“…The interest in virtual testing is globally rapidly increasing because of several advantages compared to physical tests in laboratories. In the area of passive…”
Get full text
Journal Article -
10
Analyzing the Linear Keystream Biases in AEGIS
Published in IACR Transactions on Symmetric Cryptology (01-01-2019)“…AEGIS is one of the authenticated encryption designs selected for the final portfolio of the CAESAR competition. It combines the AES round function and simple…”
Get full text
Journal Article -
11
The QARMAv2 Family of Tweakable Block Ciphers
Published in IACR Transactions on Symmetric Cryptology (19-09-2023)“…We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer…”
Get full text
Journal Article -
12
Analyzing the Linear Keystream Biases in AEGIS
Published in IACR Transactions on Symmetric Cryptology (31-01-2020)“…AEGIS is one of the authenticated encryption designs selected for the final portfolio of the CAESAR competition. It combines the AES round function and simple…”
Get full text
Journal Article -
13
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Published in IACR transactions on cryptographic hardware and embedded systems (16-08-2018)“…Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been…”
Get full text
Journal Article -
14
ISAP – Towards Side-Channel Secure Authenticated Encryption
Published in IACR Transactions on Symmetric Cryptology (08-03-2017)“…Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to…”
Get full text
Journal Article -
15
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Published in Journal of cryptology (01-07-2021)“…Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the…”
Get full text
Journal Article -
16
Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE
Published in IACR Transactions on Symmetric Cryptology (09-09-2022)“…Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on…”
Get full text
Journal Article -
17
Throwing Boomerangs into Feistel Structures
Published in IACR Transactions on Symmetric Cryptology (01-09-2022)“…Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on…”
Get full text
Journal Article -
18
Statistical Effective Fault Attacks: The Other Side of the Coin
Published in IEEE transactions on information forensics and security (2022)“…The introduction of Statistical Ineffective Fault Attacks (SIFA) has led to a renewed interest in fault attacks. SIFA requires minimal knowledge of the…”
Get full text
Journal Article -
19
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
Published in IACR Transactions on Symmetric Cryptology (01-03-2024)“…Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding…”
Get full text
Journal Article -
20
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Published in IACR Transactions on Symmetric Cryptology (07-06-2018)“…The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several…”
Get full text
Journal Article