Fast MILP models for division property

P Derbez, B Lambin - IACR Transactions on Symmetric Cryptology, 2022 - tosc.iacr.org
Nowadays, MILP is a very popular tool to help cryptographers search for various
distinguishers, in particular for integral distinguishers based on the division property …

Mathematical aspects of division property

P Hebborn, G Leander, A Udovenko - Cryptography and Communications, 2023 - Springer
This work surveys mathematical aspects of division property, which is a state-of-the-art
technique in cryptanalysis of symmetric-key algorithms, such as authenticated encryption …

轻量级分组密码算法PFP 和SLIM 的积分分析

刘道瞳, 袁征, 魏锦鹏, 姜天宇 - Journal of Cryptologic …, 2023 - search.proquest.com
Abstract PFP 算法和SLIM 算法都是基于Feistel 结构而设计的轻量级分组密码算法,
在软件及硬件上都具有良好的性能, 特别适用于资源受限的环境, 目前没有对两个算法进行积分 …

Another perspective on automatic construction of integral distinguishers for ARX ciphers

K Zhang, X Lai - Symmetry, 2022 - mdpi.com
This paper introduces a method to construct integral distinguishers for ARX ciphers. The
basic idea of this method is to utilize the symmetry between the zero-correlation linear …

Integral Cryptanalysis of Reduced-Round IIoTBC-A and Full IIoTBC-B

F Liu, Z Sun, X Luo, C Li, J Wan - Mathematics, 2024 - mdpi.com
This paper delves into the realm of cryptographic analysis by employing mixed-integer linear
programming (MILP), a powerful tool for automated cryptanalysis. Building on this …

Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra

Y Guo, D Shi, L Hu, Y Lv - International Conference on Information …, 2023 - Springer
Integral cryptanalysis is one of the frequently-used cryptanalytic methods of symmetric-key
primitives. With the help of division property and the adoption of the automatic tool Mixed …

Security Analysis of WG-7 Lightweight Stream Cipher Against Cube Attack

B Das, A Das, DR Chowdhury - International Conference on Mathematics …, 2023 - Springer
Welch–Gong (WG) is a hardware-oriented LFSR-based stream cipher. WG-7 is a version of
the eStream submission Welch–Gong, used for RFID encryption and authentication …

[PDF][PDF] Оцiнювання стiйкостi модифiкованого шифру «Калина» за допомогою програмування з обмеженнями

ВС Драга - 2022 - ela.kpi.ua
Мета дослiдження: розробка формалiзованого пiдходу до використання усiчених
диференцiалiв. Об'єкт дослiдження: iнформацiйнi процеси в системах …