Publications

From Syllab
Jump to: navigation, search


Contents

2017

Journals

  • K. Khoo, E. Lee, T. Peyrin, S. M. Sim, "Human-readable Proof of the Related-Key Security of AES-128", IACR Transactions on Symmetric Cryptology - 2017, to appear in FSE 2018
  • J. Guo, J. Jean, I. Nikolić, K. Qiao, Y. Sasaki, S. M. Sim, "Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs", IACR Transactions on Symmetric Cryptology/FSE, 2017
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, "Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions", IACR Transactions on Symmetric Cryptology/FSE, 2017

International Conferences and Workshops

  • S. Banik, S.K. Pandey, T. Peyrin, Y. Sasaki, S. M. Sim, Y. Todo. "GIFT: A Small Present", CHES 2017
  • T. Iwata, K. Minematsu, T. Peyrin and Y. Seurin, "ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication", CRYPTO 2017
  • R. Ankele, S. Banik, A. Chakraborti, E. List, F. Mendel, S. M. Sim and G. Wang, "Related-Key Impossible-Differential Attack on Reduced-Round SKINNY", ACNS 2017


2016

Journals

  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, "Extended meet-in-the-middle attacks on some Feistel constructions", Designs, Codes and Cryptography - 2016
  • J. Jean, I. Nikolić, Y. Sasaki, L. Wang, "Practical Forgeries and Distinguishers against PAES", IEICE Transactions - 2016
  • Y. Sasaki, L. Wang, "Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks", IEICE Transactions - 2016
  • Y. Sasaki, L. Wang, "Message Extension Attack against Authenticated Encryptions: Application to PANDA", IEICE Transactions - 2016
  • S. Sarkar, S. Maitra, A. Baksi, "Observing Biases in the State: Case Studies with Trivium and Trivia-SC", Designs, Codes and Cryptography - 2016
  • F. Landelle, T. Peyrin, "Cryptanalysis of Full RIPEMD-128" in Journal of Cryptology - 2016
  • T. Pandit, S.K. Pandey, R. Barua, " Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version).", JISIS, 2016

International Conferences and Workshops

  • I. Nikolić, Y. Sasaki, "A New Algorithm for the Unbalanced Meet-in-the-Middle Problem", ASIACRYPT 2016
  • P-A. Fouque, P. Karpman, P. Kirchner, B. Minaud, "Efficient and Provable White-Box Primitives", ASIACRYPT 2016
  • C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, S. M. Sim, "The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS", CRYPTO 2016
  • T. Peyrin and Y. Seurin, "Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers", CRYPTO 2016
  • M. Stevens, P. Karpman, T. Peyrin, "Freestart collision on full SHA-1", EUROCRYPT 2016
  • M. Liu, S. M. Sim, "Lightweight MDS Generalized Circulant Matrices", FSE 2016
  • J. Jean, I. Nikolić, "Efficient Design Strategies Based on the AES Round Function", FSE 2016
  • S. Sarkar, S. M. Sim, "A deeper understanding of the XOR count distribution in the context of lightweight cryptography", AFRICACRYPT 2016
  • A. Chattopadhyay, A. Baksi. "Low-Quantum Cost Circuit Constructions for Adder and Symmetric Boolean Functions", ISCAS (Special Session) 2016
  • J. Breier, D. Jap, S. Bhasin. "The Other Side of the Coin: Analyzing Software Encoding Schemes against Fault Injection Attacks", HOST 2016
  • D. Jap, W. He, S. Bhasin. "Supervised and Unsupervised Machine Learning for Side-Channel based Trojan Detection", ASAP 2016
  • K.C. Gupta, S.K. Pandey, I.G. Ray, "Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes.", INDOCRYPT 2016


2015

Journals

  • T. Peyrin, "Collision Attack on Grindahl" in Journal of Cryptology - 2015
  • I. Nikolić, L. Wang, S. Wu, "The parallel-cut meet-in-the-middle attack", in Cryptography and Communications - September 2015
  • Y. Sasaki, L. Wang, "Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs", in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015
  • Y. Sasaki, G. Wang, L. Wang, "Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC", in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2015

International Conferences and Workshops

  • I. Nikolić, Y. Sasaki, "Refinements of the k-tree Algorithm for the Generalized Birthday Problem", ASIACRYPT 2015
  • B. Minaud, P. Derbez, P-A. Fouque, P. Karpman, "Key-Recovery Attacks on ASASA" in Advances in Cryptology - ASIACRYPT 2015 - (Invited to JoC)
  • J. Jean, Y. Sasaki, L. Wang, "Analysis of the CAESAR Candidate Silver" in Selected Areas in Cryptography 2015 - SAC 2015
  • P. Karpman, "From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour" in Information Security Conference - ISC 2015
  • C. Blondeau, T. Peyrin, L. Wang, "Known-key Distinguisher on Full PRESENT" in Advances in Cryptology - CRYPTO 2015
  • P. Karpman, T. Peyrin, M. Stevens, "Practical Free-Start Collision Attacks on 76-step SHA-1" in Advances in Cryptology - CRYPTO 2015
  • T. Espitau, P-A. Fouque, P. Karpman, "Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE" in Advances in Cryptology - CRYPTO 2015
  • J. Jean, I. Nikolić, "Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation", FSE 2015
  • D. Khovratovich, I. Nikolić, J. Pieprzyk, P. Sokolowski, R. Steinfeld, "Rotational Cryptanalysis of ARX Revisited", FSE 2015
  • S. M. Sim, K. Khoo, F. Oggier, T. Peyrin, "Lightweight MDS Involution Matrices"- FSE 2015
  • T. Peyrin, S. M. Sim, L. Wang, G. Zhang, "Cryptanalysis of JAMBU"- FSE 2015
  • G. Leurent, L. Wang, "The Sum Can Be Weaker Than Each Part" in Advances in Cryptology - EUROCRYPT 2015


2014

Journals

  • J. Jean, M. Naya-Plasencia, T. Peyrin, "Improved Cryptanalysis of AES-like Permutations" in Journal of Cryptology - July 2013
  • S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, "The Resistance of PRESENT-80 Against Related-Key Differential Attacks", in Cryptography and Communications, September 2014
  • D. Khovratovich, I. Nikolić, C. Rechberger, "Rotational Rebound Attacks on Reduced Skein", in Journal of Cryptology, July 2014
  • Y. Sasaki, L. Wang, "Comprehensive Study of Integral Analysis on LBlock", in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014
  • Y. Sasaki, L. Wang, "Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160", in IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences - January 2014

International Conferences and Workshops

  • N. Anandakumar, T. Peyrin, A. Poschmann, "A Very Compact FPGA Implementation of LED and PHOTON" - INDOCRYPT 2014
  • J. Guo, J. Jean, I. Nikolić, Y. Sasaki, "Meet-in-the-Middle Attacks on Generic Feistel Constructions" - ASIACRYPT 2014
  • S. Emami, S. Ling, I. Nikolić, J. Pieprzyk, H. Wang, "Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128" - ASIACRYPT 2014
  • J. Jean, I. Nikolić, T. Peyrin, "Tweaks and Keys for Block Ciphers: the TWEAKEY Framework" - ASIACRYPT 2014
  • Y. Sasaki, L. Wang, "Message Extension Attack against Authenticated Encryptions: Application to PANDA" - CANS 2014
  • A. Biryukov, I. Nikolić, "Colliding Keys for SC2000-256" in Selected Areas in Cryptography - SAC 2014
  • D. Augot, P-A. Fouque, P. Karpman, "Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation" in Selected Areas in Cryptography - SAC 2014
  • J. Jean, I. Nikolić, Y. Sasaki, L. Wang, "Practical Cryptanalysis of PAES" in Selected Areas in Cryptography - SAC 2014
  • J. Guo, J. Jean, G. Leurent, T. Peyrin, L. Wang, "The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function" in Selected Areas in Cryptography - SAC 2014
  • Y. Sasaki, L. Wang, "Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks" - SCN 2014
  • K. Khoo, T. Peyrin, A. Poschmann, H. Yap, "FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison" - CHES 2014
  • J. Guo, T. Peyrin, Y. Sasaki, L. Wang, "Updates on Generic Attacks against HMAC and NMAC" in Advances in Cryptology - CRYPTO 2014
  • T. Peyrin, L. Wang, "Generic Universal Forgery Attack on Iterative Hash-based MACs" in Advances in Cryptology - EUROCRYPT 2014
  • I. Dinur, J. Jean, "Cryptanalysis of FIDES" - FSE 2014
  • T. Iwata, L. Wang, "Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs" - FSE 2014
  • J. Guo, Y. Sasaki, L. Wang, M. Wang, L. Wen, "Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds" - FSE 2014
  • T. Iwata, K. Minematsu, J. Guo, S. Morioka, "CLOC: Authenticated Encryption for Short Input" - FSE 2014
  • J. Guo, P. Karpman, I. Nikolić, L. Wang, S. Wu, "Analysis of BLAKE2" in RSA Conference Cryptographers' Track - CT-RSA 2014
  • Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, K. Ohta , "An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl" in RSA Conference Cryptographers' Track - CT-RSA 2014


2013

International Conferences and Workshops

  • P-A. Fouque, P. Karpman, "Security Amplification against Meet-in-the-Middle Attacks Using Whitening" - IMA CC 2013
  • G. Leurent, T. Peyrin, L. Wang, "New Generic Attacks Against Hash-based MACs" in Advances in Cryptology - ASIACRYPT 2013
  • F. Mendel, T. Peyrin, M. Schläffer, L. Wang, S. Wu, "Improved Cryptanalysis of Reduced RIPEMD-160" in Advances in Cryptology - ASIACRYPT 2013
  • M. Iwamoto, T. Peyrin, Y. Sasaki, "Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful" in Advances in Cryptology - ASIACRYPT 2013
  • J. Guo, Y. Sasaki, L. Wang, S. Wu, "Cryptanalysis of HMAC/NMAC-Whirlpool" in Advances in Cryptology - ASIACRYPT 2013
  • Y. Sasaki, L. Wang, "Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5" in Selected Areas of Cryptography - SAC 2013
  • J. Jean, M. Naya-Plasencia, T. Peyrin, "Multiple Limited-Birthday Distinguishers and Applications" in Selected Areas of Cryptography - SAC 2013
  • R. Benadjila, J. Guo, V. Lomné, T. Peyrin, "Implementing Lightweight Block Ciphers on x86 Architectures" in Selected Areas of Cryptography - SAC 2013
  • P.-A. Fouque, J. Jean, T. Peyrin, "Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128" in Advances in Cryptology - CRYPTO 2013
  • F. Landelle, T. Peyrin, "Cryptanalysis of Full RIPEMD-128" in Advances in Cryptology - EUROCRYPT 2013 - (Invited to JoC)
  • F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann, S. Chakraborty, "Security Challenges in Automotive Hardware/Software Architecture Design" in Design, Automation & Test in Europe - DATE 2013
  • J. Jean, I. Nikolic, T. Peyrin, L. Wang, S. Wu, "Security Analysis of PRINCE" in Fast Software Encryption - FSE 2013
  • I. Nikolić, L. Wang, S. Wu, "Cryptanalysis of Round-Reduced LED" in Fast Software Encryption - FSE 2013
  • A. Biryukov, I. Nikolić, "Complementing Feistel Ciphers" in Fast Software Encryption - FSE 2013
  • Y. Sasaki, L. Wang, "Bitwise Partial-sum: A New Tool for Integral Analysis against ARX Designs" in International Conference on Information Security and Cryptology - ICISC 2013
  • Y. Naito, Y. Sasaki, L. Wang, K. Yasuda, "Generic State-Recovery and Forgery Attacks on ChopMD-MAC and NMAC/HMAC" in International Workshop on Security - IWSEC 2013
  • Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang , M. Iwamoto, K. Ohta, K. Sakiyama, "Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL" in International Conference on Security and Cryptography - SECRYPT 2013


2012

International Conferences and Workshops

  • T. Peyrin, Y. Sasaki, L. Wang, "Generic Related-key Attacks for HMAC" in Advances in Cryptology - ASIACRYPT 2012
  • Y. Sasaki, L. Wang, S. Wu, W.L. Wu, "Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks" in Advances in Cryptology - ASIACRYPT 2012
  • J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann, C. H. Tan, "SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks" in Progress in Cryptology - AFRICACRYPT 2012
  • L. Wei, T. Peyrin, P. Sokołowski, S. Ling, J. Pieprzyk, H. Wang, "On the (In)Security of IDEA in Various Hashing Modes" in Fast Software Encryption - FSE 2012
  • J. Jean, M. Naya-Plasencia, T. Peyrin, "Improved Rebound Attack on the Finalist Grøstl" in Fast Software Encryption - FSE 2012 - (Best Paper Award)
  • M. Naya-Plasencia, T. Peyrin, "Practical Cryptanalysis of ARMADILLO2" in Fast Software Encryption - FSE 2012
  • A. Duc, J. Guo, T. Peyrin, L.Wei, "Unaligned Rebound Attack: Application to Keccak" in Fast Software Encryption - FSE 2012
  • Y. Sasaki, L. Wang, "Comprehensive Study of Integral Analysis on 22-Round LBlock" in International Conference on Information Security and Cryptology - ICISC 2012