Out of OddityâNew Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
107
2020
12
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
95
2016
13
CSI: RowhammerâCryptographic security and integrity against rowhammer
91
2023
14
Protecting against Statistical Ineffective Fault Attacks
88
2019
15
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
84
2020
16
Ascon v1.2. Submission to the CAESAR competition
82
2016
17
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates
70
2015
18
Higher-order cryptanalysis of LowMC
69
2015
19
65
2019
20
Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks
60
2023
21
The tweakable block cipher family QARMAv2
59
2023
22
PRINCE v2: More Security for (Almost) No Overhead
54
2020
23
Ascon v1. 2 submission to nist
45
2021
24
Malicious Hashing: Eveâs Variant of SHA-1
45
2014
25
Square Attack on 7-Round Kiasu-BC
42
2016
26
Branching heuristics in differential collision search with applications to SHA-512
41
2014
27
SPHINCS+: Submission to the NIST post-quantum project (v. 3.1)
40
2022
28
Throwing boomerangs into Feistel structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE
40
2022
29
Analyzing the Linear Keystream Biases in AEGIS
39
2022
30
Practical key-recovery attack on MANTIS5
38
2016
31
Bounds for the security of Ascon against differential and linear cryptanalysis
37
2022
32
Improved search for integral, impossible differential and zero-correlation attacks: application to ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
37
2024
33
On the security of fresh re-keying to counteract side-channel and fault attacks
36
2014
34
Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
34
2024
35
Clustering Related-Tweak Characteristics: Application to MANTIS-6
32
2017
36
Scatter and split securely: Defeating cache contention and occupancy attacks
32
2023
37
Ascon PRF, MAC, and Short-Input MAC: Lightweight, Fast, and Efficient Pseudorandom Functions
31
2024
38
Ascon v1
27
2014
39
Autoguess: a tool for finding guess-and-determine attacks and key bridges
26
2022
40
Statistical effective fault attacks: The other side of the coin