[Resource Topic] 2025/1314: Blink: A Family of Low-latency Tweakable Block Ciphers
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1265: A note on a recent attack against SPEEDY-7-192
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1262: Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1238: Extended $c$-differential distinguishers of full $9$ and reduced-round Kuznyechik cipher
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1235: HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1221: EWEMrl: A White-Box Secure Cipher with Longevity
|
|
0
|
1
|
July 7, 2025
|
[Resource Topic] 2025/1217: Cymric: Short-tailed but Mighty
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1183: PA1 Security on Release of Unverified Plaintext in Encrypt-then-MAC AE Schemes
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1180: Cryptanalysis of HiAE
|
|
0
|
4
|
June 24, 2025
|
[Resource Topic] 2025/1165: Automated Analysis and Synthesis of Message Authentication Codes
|
|
0
|
4
|
June 20, 2025
|
[Resource Topic] 2025/1148: On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1133: A Note on the Rank Defect Phenomena in The Linearization Attack on Elisabeth-4
|
|
0
|
1
|
June 17, 2025
|
[Resource Topic] 2025/1127: KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More
|
|
0
|
1
|
June 17, 2025
|
[Resource Topic] 2025/1123: Cryptographic Treatment of Key Control Security -- In Light of NIST SP 800-108
|
|
0
|
5
|
June 16, 2025
|
[Resource Topic] 2025/1089: Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security
|
|
0
|
3
|
June 12, 2025
|
[Resource Topic] 2025/1059: Post-Quantum Security of Keyed Sponge-Based Constructions through a Modular Approach
|
|
0
|
4
|
June 9, 2025
|
[Resource Topic] 2025/1051: Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network
|
|
0
|
4
|
June 6, 2025
|
[Resource Topic] 2025/1050: Integral Resistance of Block Ciphers with Key Whitening by Modular Addition
|
|
0
|
6
|
June 6, 2025
|
[Resource Topic] 2025/1031: Quasidifferential Saves Infeasible Differential: Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT
|
|
0
|
4
|
June 4, 2025
|
[Resource Topic] 2025/1006: Adding Feeding Forward Back to the Sponge Construction
|
|
0
|
0
|
June 2, 2025
|
[Resource Topic] 2025/984: AsconAEAD128 Revisited in the Multi-user Setting
|
|
0
|
2
|
June 2, 2025
|
[Resource Topic] 2025/976: The Large Block Cipher Family Vistrutah
|
|
0
|
3
|
June 2, 2025
|
[Resource Topic] 2025/963: Permutation-Based Hashing with Stronger (Second) Preimage Resistance - Application to Hash-Based Signature Schemes
|
|
0
|
4
|
May 27, 2025
|
[Resource Topic] 2025/955: Towards Better Integral Distinguishers over $\mathbb{F}_{p}$ Based on Exact Coefficients of Monomials
|
|
0
|
4
|
May 26, 2025
|
[Resource Topic] 2025/953: Tight Multi-User Security of CCM and Enhancement by Tag-Based Key Derivation Applied to GCM and CCM
|
|
0
|
3
|
May 26, 2025
|
[Resource Topic] 2025/951: Enhancing Provable Security and Efficiency of Permutation-based DRBGs
|
|
0
|
3
|
May 26, 2025
|
[Resource Topic] 2025/945: Quantum Security Analysis of the Key-Alternating Ciphers
|
|
0
|
5
|
May 26, 2025
|
[Resource Topic] 2025/932: Integral cryptanalysis in characteristic $p$
|
|
0
|
3
|
May 23, 2025
|
[Resource Topic] 2025/926: Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues (Full Version)
|
|
0
|
5
|
May 23, 2025
|
[Resource Topic] 2025/925: SCMAC and LOL2.0: An AEAD Design Framework and A New Version of LOL Stream Cipher Design Framework
|
|
0
|
4
|
May 23, 2025
|