Sciweavers

IACR
2016
41views Biometrics» more  IACR 2016»
9 years 12 months ago
On the nonlinearity of monotone Boolean functions
We first prove the truthfulness of a conjecture on the nonlinearity of monotone Boolean functions in even dimension, proposed in the recent paper “Cryptographic properties of mo...
Claude Carlet
IACR
2016
40views Biometrics» more  IACR 2016»
9 years 12 months ago
On low degree polynomials in 2-round AES
Recent observations on polynomial structures of AES-like round functions are analysed in this note. We present computational evidence that input/output bits of AESlike 2-round tra...
Igor A. Semaev
108
Voted
IACR
2016
40views Biometrics» more  IACR 2016»
9 years 12 months ago
On Linear Hulls and Trails in Simon
The block cipher Simon has a very simple round function. This simplicity allows us to compute the correlation matrix of the round function. Despite its simplicity, Simon exhibits s...
Tomer Ashur, Vincent Rijmen
104
Voted
IACR
2016
45views Biometrics» more  IACR 2016»
9 years 12 months ago
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
The Russian Federation’s standardization agency has recently published a hash function called Streebog and a 128-bit block cipher called Kuznyechik. Both of these algorithms use ...
Alex Biryukov, Léo Perrin, Aleksei Udovenko
101
Voted
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
There are many kinds of attacks that can be mounted on block ciphers: differential attacks, impossible differential attacks, truncated differential attacks, boomerang attacks. W...
Emmanuel Volte, Valérie Nachef, Nicolas Mar...
105
Voted
IACR
2016
32views Biometrics» more  IACR 2016»
9 years 12 months ago
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
We introduce a new technique for tight security proofs called work factor partitioning. Using this technique in a modified version of the framework of D¨ottling and Schr¨oder (C...
Tibor Jager
94
Voted
IACR
2016
43views Biometrics» more  IACR 2016»
9 years 12 months ago
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
—Modular multiplication is the fundamental and compute-intense operation in many Public-Key crypto-systems. This paper presents two modular multipliers with their efficient arch...
Khalid Javeed, Xiaojun Wang
102
Voted
IACR
2016
45views Biometrics» more  IACR 2016»
9 years 12 months ago
Universal Composition with Responsive Environments
In universal composability frameworks, adversaries (or environments) and protocols/ideal functionalities often have to exchange meta-information on the network interface, such as a...
Jan Camenisch, Robert R. Enderlein, Stephan Krenn,...