Zobrazeno 1 - 10
of 24
pro vyhledávání: '"André Schrottenloher"'
Autor:
Xavier Bonnetain, André Schrottenloher
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
Quantum attacks using superposition queries are known to break many classically secure modes of operation. While these attacks do not necessarily threaten the security of the modes themselves, since they rely on a strong adversary model, they help us
Externí odkaz:
https://doaj.org/article/49137e6c63dd4581a8f65375db2f2ff9
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
Recently, there has been a surge of interest in the security of authenticated encryption with associated data (AEAD) within the context of key commitment frameworks. Security within this framework ensures that a ciphertext chosen by an adversary does
Externí odkaz:
https://doaj.org/article/df5bebbb17ee4b62ad2593383a9d89a9
Autor:
André Schrottenloher, Marc Stevens
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 3 (2023)
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem. Bao
Externí odkaz:
https://doaj.org/article/432c3be60f174d4bb2a29704f7d6f423
Publikováno v:
Discrete Mathematics & Theoretical Computer Science, Vol vol. 23 no. 2, special issue..., Iss Special issues (2022)
The finite models of a universal sentence $\Phi$ in a finite relational signature are the age of a structure if and only if $\Phi$ has the joint embedding property. We prove that the computational problem whether a given universal sentence $\Phi$ has
Externí odkaz:
https://doaj.org/article/fd36e8bb44404e028d82ce3c5f0017a4
Autor:
Anne Canteaut, Sébastien Duval, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, André Schrottenloher
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
The cryptographic algorithms needed to ensure the security of our communications have a cost. For devices with little computing power, whose number is expected to grow significantly with the spread of the Internet of Things (IoT), this cost can be a
Externí odkaz:
https://doaj.org/article/b9d12d887ca541afb36c4b262c6226da
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 2 (2019)
In this paper we analyze for the first time the post-quantum security of AES. AES is the most popular and widely used block cipher, established as the encryption standard by the NIST in 2001. We consider the secret key setting and, in particular, AES
Externí odkaz:
https://doaj.org/article/55fa9875d1bc4ab989a1fa43dfd55906
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031305887
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a1f9e41c28088d6d141f3cea79baae3
https://doi.org/10.1007/978-3-031-30589-4_8
https://doi.org/10.1007/978-3-031-30589-4_8
Autor:
André Schrottenloher, Marc Stevens
Publikováno v:
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159817
Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths (’forwards’ and ’backwards’) that are then matched. Over time, MITM attacks improved using more refined techniques and exploiting a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::06563d87726d0b4aacff43409bc6865e
https://doi.org/10.1007/978-3-031-15982-4_24
https://doi.org/10.1007/978-3-031-15982-4_24
Publikováno v:
EUROCRYPT 2022
Lecture Notes in Computer Science
EUROCRYPT 2022-41st Annual International Conference on the Theory and Applications of Cryptographic Techniques
EUROCRYPT 2022-41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2022, Trondheim, Norway. pp.315-344, ⟨10.1007/978-3-031-07082-2_12⟩
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031070815
Lecture Notes in Computer Science
EUROCRYPT 2022-41st Annual International Conference on the Theory and Applications of Cryptographic Techniques
EUROCRYPT 2022-41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2022, Trondheim, Norway. pp.315-344, ⟨10.1007/978-3-031-07082-2_12⟩
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031070815
International audience; In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than quadratic time speedup compared to the best classical attack. We study the 2XOR-
Publikováno v:
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Virtual, Singapore. pp.272-302, ⟨10.1007/978-3-030-92062-3_10⟩
Lecture Notes in Computer Science ISBN: 9783030920616
ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security, Dec 2021, Virtual, Singapore. pp.272-302, ⟨10.1007/978-3-030-92062-3_10⟩
Lecture Notes in Computer Science ISBN: 9783030920616
International audience; Simon and Simeck are two lightweight block ciphers with a simple round function using only word rotations and a bit-wise AND operation. Previous work has shown a strong clustering effect for differential and linear cryptanalys
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b364a54f91cab35961ddb053ef0e5bf5
https://hal.inria.fr/hal-03529507/document
https://hal.inria.fr/hal-03529507/document