Abstract is missing.
- Generic MitM Attack Frameworks on Sponge ConstructionsXiaoyang Dong 0001, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang 0001. 3-37 [doi]
- Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENTHosein Hadipour, Patrick Derbez, Maria Eichlseder. 38-72 [doi]
- Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear ApproximationsZhongfeng Niu, Kai Hu 0001, Siwei Sun, Zhiyu Zhang, Meiqin Wang. 73-104 [doi]
- Improving Generic Attacks Using Exceptional FunctionsXavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher. 105-138 [doi]
- The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented PrimitivesAugustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, Léo Perrin, Håvard Raddum. 139-173 [doi]
- New Approaches for Estimating the Bias of Differential-Linear DistinguishersTing Peng, Wentao Zhang, Jingsui Weng, Tianyou Ding. 174-205 [doi]
- Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSMGildas Avoine, Xavier Carpent, Tristan Claverie, Christophe Devine, Diane Leblanc-Albarel. 206-240 [doi]
- Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3Zhongyi Zhang, Chengan Hou, Meicheng Liu. 241-272 [doi]
- Feistel-Like Structures Revisited: Classification and CryptanalysisBing Sun 0001, Zejun Xiang 0001, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu. 275-304 [doi]
- Succinctly-Committing Authenticated EncryptionMihir Bellare, Viet Tung Hoang. 305-339 [doi]
- HAWKEYE - Recovering Symmetric Cryptography From Hardware CircuitsGregor Leander, Christof Paar, Julian Speith, Lukas Stennes. 340-376 [doi]
- Tight Characterizations for Preprocessing Against Cryptographic SaltingFangqi Dong, Qipeng Liu 0001, Kewen Wu 0001. 377-411 [doi]
- Algebraic Structure of the Iterates of χBjörn Kriepke, Gohar M. Kyureghyan. 412-424 [doi]
- The Committing Security of MACs with Applications to Generic CompositionRitam Bhaumik, Bishwajit Chakraborty 0002, Wonseok Choi 0002, Avijit Dutta, Jérôme Govinden, Yaobin Shen. 425-462 [doi]
- Information-Theoretic Security with AsymmetriesTim Beyne, Yu Long Chen. 463-494 [doi]