一加就喷出 发表于 2025-3-30 10:04:23
http://reply.papertrans.cn/17/1673/167235/167235_51.png占线 发表于 2025-3-30 15:09:50
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, Cen the two parts of the DL distinguisher across multiple rounds. Then, we introduce a highly versatile and easy-to-use automatic tool for exploring DL distinguishers, inspired by automatic tools for boomerang distinguishers. This tool considers the dependency between differential and linear trails aFRAUD 发表于 2025-3-30 16:45:57
Improving Generic Attacks Using Exceptional Functionse of the first one. Next, we introduce several new generic attacks against hash combiners, notably using small cycles to improve the complexities of the best existing attacks on the XOR combiner, Zipper Hash and Hash-Twice..Last but not least, we propose the first quantum second preimage attack agai高原 发表于 2025-3-30 22:38:38
New Approaches for Estimating the Bias of Differential-Linear Distinguishersropose two novel approaches for estimating the bias of a differential-linear distinguisher. We demonstrate the accuracy and efficiency of our new approaches by applying them to 5 symmetric-key primitives: Ascon, Serpent, KNOT, AES, and CLEFIA. For Ascon and Serpent, we update the best known differenProstatism 发表于 2025-3-31 01:32:13
http://reply.papertrans.cn/17/1673/167235/167235_55.png抗生素 发表于 2025-3-31 06:37:11
http://reply.papertrans.cn/17/1673/167235/167235_56.png滋养 发表于 2025-3-31 10:38:25
– Recovering Symmetric Cryptography From Hardware Circuitsal results, which involve SPN, ARX, Feistel, and LFSR-based ciphers implemented for both FPGAs and ASICs. We demonstrate the real-world applicability of . by evaluating it on OpenTitan’s Earl Grey chip, an open-source secure micro-controller design. . locates all major cryptographic primitives prese材料等 发表于 2025-3-31 16:43:10
Tight Characterizations for Preprocessing Against Cryptographic Saltingons for property finding games, resolving an open problem of the quantum non-uniform security of salted collision resistant hash by Chung, Guo, Liu, and Qian (FOCS’20). Our proof extends the compressed oracle framework of Zhandry (CRYPTO’19) to prove quantum strong direct product theorems for proper细查 发表于 2025-3-31 20:14:00
http://reply.papertrans.cn/17/1673/167235/167235_59.pngoutrage 发表于 2025-3-31 22:25:47
http://reply.papertrans.cn/17/1673/167235/167235_60.png