Quantum linearization attacks

X Bonnetain, G Leurent, M Naya-Plasencia… - Advances in Cryptology …, 2021 - Springer
Recent works have shown that quantum period-finding can be used to break many popular
constructions (some block ciphers such as Even-Mansour, multiple MACs and AEs...) in the …

Proof of Mirror Theory for a Wide Range of 

B Cogliati, A Dutta, M Nandi, J Patarin… - … Conference on the Theory …, 2023 - Springer
In CRYPTO'03, Patarin conjectured a lower bound on the number of distinct solutions (P
1,…, P q)∈({0, 1} n) q satisfying a system of equations of the form X i⊕ X j= λ i, j such that P …

Improved multi-user security using the squared-ratio method

YL Chen, W Choi, C Lee - Annual International Cryptology Conference, 2023 - Springer
Proving security bounds in contexts with a large number of users is one of the central
problems in symmetric-key cryptography today. This paper introduces a new method for …

Tight security of cascaded LRW2

A Jha, M Nandi - Journal of Cryptology, 2020 - Springer
At CRYPTO'12, Landecker et al. introduced the cascaded LRW2 (or CLRW2) construction
and proved that it is a secure tweakable block cipher up to roughly 2^ 2n/3 2 2 n/3 queries …

Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting

Y Shen, L Wang, D Gu, J Weng - Annual International Cryptology …, 2021 - Springer
Abstract Double-block Hash-then-Sum (DbHtS) MACs are a class of MACs that aim for
achieving beyond-birthday-bound security, including SUM-ECBC, PMAC_Plus, 3kf9 and …

Attacks on beyond-birthday-bound MACs in the quantum setting

T Guo, P Wang, L Hu, D Ye - … , PQCrypto 2021, Daejeon, South Korea, July …, 2021 - Springer
We systematically study the security of twelve Beyond-Birthday-Bound Message
Authentication Codes (BBB MACs) in the Q2 model where attackers have quantum-query …

Tight multi-user security bound of DbHtS

N Datta, A Dutta, M Nandi, S Talnikar - IACR Transactions on …, 2023 - tosc.iacr.org
In CRYPTO'21, Shen et al. proved that Two-Keyed-DbHtS construction is secure up to 2 2n/3
queries in the multi-user setting independent of the number of users. Here the underlying …

Improved security analysis for nonce-based enhanced hash-then-mask MACs

W Choi, BH Lee, Y Lee, J Lee - … Conference on the Theory and Application …, 2020 - Springer
In this paper, we prove that the nonce-based enhanced hash-then-mask MAC (nEHtM
nEHtM) is secure up to 2^ 3n 4 2 3 n 4 MAC queries and 2^ n 2 n verification queries …

Forgery attacks on several beyond-birthday-bound secure MACs

Y Shen, FX Standaert, L Wang - … Conference on the Theory and Application …, 2023 - Springer
At CRYPTO'18, Datta et al. proposed nPolyMAC and proved the security up to 2 2 n/3
authentication queries and 2 n verification queries. At EUROCRYPT'19, Dutta et al …

Categorization of faulty nonce misuse resistant message authentication

YL Chen, B Mennink, B Preneel - … on the Theory and Application of …, 2021 - Springer
A growing number of lightweight block ciphers are proposed for environments such as the
Internet of Things. An important contribution to the reduced implementation cost is a block …