all InfoSec news
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Feb. 16, 2024, 3 a.m. |
IACR News www.iacr.org
ePrint Report: Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
Hosein Hadipour, Patrick Derbez, Maria Eichlseder
In 1994, Langford and Hellman introduced differential-linear (DL) cryptanalysis, with the idea of decomposing the block cipher E into two parts, EU and EL, such that EU exhibits a high-probability differential trail, while EL has a high-correlation linear trail.Combining these trails forms a distinguisher for E, assuming independence between EU …
aes application ascon attacks eprint report hellman linear perspective report serpent warp
More from www.iacr.org / IACR News
Postdoctoral Researcher
1 day, 17 hours ago |
www.iacr.org
Blink: An Optimal Proof of Proof-of-Work
2 days, 17 hours ago |
www.iacr.org
PN-based Attacks in the White-box Setting
2 days, 17 hours ago |
www.iacr.org
Succinct Functional Commitments for Circuits from k-Lin
2 days, 23 hours ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
2 days, 23 hours ago |
www.iacr.org
Unstructured Inversions of New Hope
2 days, 23 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Sr. Staff Security Engineer
@ Databricks | San Francisco, California
Security Engineer
@ Nomi Health | Austin, Texas
Senior Principal Consultant, Security Architecture
@ 6point6 | Manchester, United Kingdom
Cyber Policy Advisor
@ IntelliBridge | McLean, VA, McLean, VA, US
TW Full Stack Software Engineer (Access Control & Intrusion Systems)
@ Bosch Group | Taipei, Taiwan
Cyber Software Engineer
@ Peraton | Annapolis Junction, MD, United States