Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

F Zhang, Z Liang, B Yang, X Zhao, S Guo… - Frontiers of Information …, 2018 - Springer
Abstract The Competition for Authenticated Encryption: Security, Applicability, and
Robustness (CAESAR) supported by the National Institute of Standards and Technology …

Practical key-recovery attacks on round-reduced Ketje Jr, Xoodoo-AE and Xoodyak

H Zhou, Z Li, X Dong, K Jia, W Meier - The Computer Journal, 2020 - academic.oup.com
A new conditional cube attack was proposed by Li et al. at ToSC 2019 for cryptanalysis of
Keccak keyed modes. In this paper, we find a new property of Li et al.'s method. The …

New conditional cube attack on Keccak keyed modes

Z Li, X Dong, W Bi, K Jia, X Wang… - IACR Transactions on …, 2019 - tosc.iacr.org
The conditional cube attack on round-reduced Keccak keyed modes was proposed by
Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was …

MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes

W Bi, X Dong, Z Li, R Zong, X Wang - Designs, Codes and Cryptography, 2019 - Springer
Cube-attack-like cryptanalysis was proposed by Dinur et al. at EUROCRYPT 2015, which
recovers the key of Keccak keyed modes in a divide-and-conquer manner. In their attack …

Conditional Cube Attack on Lightweight Sycon-AEAD-64

H Eom, M Cho, C Lee - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Huang et al. introduced the conditional cube attack at EUROCRYPT 2017, where it was
presented as a conditional cube variable with specific key bit conditions that significantly …

A cube attack on a reduced-round Sycon

M Cho, H Eom, E Tcydenova, C Lee - Electronics, 2022 - mdpi.com
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials
for specific output bits of a BlackBox cipher. Cube attacks target recovery keys or secret …

Conditional cube searching and applications on Trivium-variant ciphers

X Zhang, M Liu, D Lin - … Security: 21st International Conference, ISC 2018 …, 2018 - Springer
In this paper, we describe a new cube searching method called conditional searching. The
main idea of this new searching method is to reduce the searching space and contains two …

[PDF][PDF] A Cube Attack on a Reduced-Round Sycon. Electronics 2022, 11, 3605

M Cho, H Eom, E Tcydenova, C Lee - Security and Privacy for Modern …, 2022 - core.ac.uk
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials
for specific output bits of a BlackBox cipher. Cube attacks target recovery keys or secret …

[PDF][PDF] Side channel protected Keyak on ARM cortex-M4

M Meyers, J Daemen, L Batina - 2017 - cs.ru.nl
Authenticated encryption provides both confidentiality and authentication where non
authenticated encryption only provides confidentiality. One authenticated encryption …