International Workshop on Dynamical Systems and Applications

Kriptanaliz Makaleleri

 

3.Tur Algoritmalarına Yapılan Güvenlik Analiz / Kriptanaliz Makaleleri:

 

ACORN:            

- Cryptanalysis of ACORN

Full key-recovery on ACORN in nonce-reuse and decryption-misuse settings

Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN

 

AES-COPA:

On the Security Claim of Tag Guessing of the AES-COPA Authenticated Encryption Algorithm

 

AES-JAMBU:   

Cryptanalysis of JAMBU​

 

AEZ:

Observation on Weak Keys for AEZ

Collision Attacks against CAESAR Candidates: Forgery and Key-Recovery against AEZ and Marble

Robust Authenticated-Encryption AEZ and the Problem that it Solves

 

ASCON:      

- Cryptanalysis of Ascon      

- Truncated, Impossible, and Improbable Differential Analysis of Ascon 

Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes

Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates

 

CLOC & SILC:

CLOC: Authenticated Encryption for Short Input

A chosen plaintext attack on SILC and CLOC

 

Deoxys:

- Fractional Data for Nonce-Misuse Resistant Mode for Kiasu, Joltik and Deoxys

 

Keyak:

Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes

 

MORUS:              
 

 

NORX:

Analysis of NORX: Investigating Differential and Rotational Properties

Cryptanalysis of Reduced NORX

Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes

 

 

2.Tur Algoritmalarına Yapılan Güvenlik Analiz / Kriptanaliz Makaleleri:

 
 
ICEPOLE:
 
 
                       
 
Joltik:
 
 
 
 
OMD:
 
 
 
 
 
Pi-Cipher:
 
 
 
 
 
POET:
 
 
 
 
 
 
PRIMATEs:         
 
                         
 
 
 
 
  

SCREAM:  

A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro    

Practical Forgery Attacks on SCREAM and iSCREAM

 

STRIBOB:

Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes

Lighter, Faster and Constant-Time: WhirlBob, the Whirlpool variant of StriBob

STRIBOB: authenticated encryption from GOST R 34.11-2012 LPS permutation

STRIBOB / WHIRLBOB Security Analysis Addendum

WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time

 

TriviA-ck:

Related Key/IV Pairs for Trivia-SC

 

                                                                                                                                                                                                 

1.Tur Algoritmalarına Yapılan Kriptanaliz Makaleleri:

 

PANDA:

A Forgery Attack against PANDA-s

 

PAES:    

- A Practical Universal Forgery Attack against PAES-8 

Using AES Round Symmetries to Distinguish PAES