supported by the Natural Science Foundation of Henan (Grant No.222300420100);the Foundation of Key Laboratory of National Defense Science and Technology (Grant No.61421030107);the National Natural Science Foundation of China (Grant Nos.61802437,62372463,and 62302518)。
Related-key model is a favourable approach to improve attacks on block ciphers with a simple key schedule.However,to the best of our knowledge,there are a few results in which zero-correlation linear attacks take adva...
sponsored by the Natural Science Foundation of Henan(No.222300420100);the Foundation of Key Laboratory of National Defense Science and Technology,China(61421030107).
At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlat...
Erratum to:Front.Comput.Sci.,2023,17(4):174808.DOI 10.1007/s11704-022-2206-2.The conditions of Proposition 3 in this paper are insufficient.The proposition is corrected as follows.Proposition 3 Given a pair of input p...
supported by National Key Research and Development Program of China(Grant No.2017YFA0303903);National Cryptography Development Fund(Grant Nos.MMJJ20170121,MMJJ20170102);Zhejiang Province Key R&D Project(Grant No.2017C01062);National Natural Science Foundation of China(Grant Nos.61572293,61502276,61692276);Major Scientific and Technological Innovation Projects of Shandong Province(Grant No.2017CXGC0704);National Natural Science Foundation of Shandong Province(Grant No.ZR2016FM22)。
Dear editor,Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two powerful methods in the block cipher field.Herein,we present an automatic tool to find impossible differentials(IDs)a...
supported by the National Cipher Development Foundation(No.MMJJ20180203);the State Key Laboratory of Mathematical Engineering and Advanced Computation Open Foundation(No.2018A03);the Foundation of Science and Technology on Information Assurance Laboratory(No.KJ-17-002)。
Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994,and then some generalized theories are developed to complement and unify the method.However,the links between differe...
supported by the National Natural Science Foundation of China under Grant No. 61572516, 61402523, 61202491, 61272041 and 61272488
In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible...
This work was supported by the National Basic Research 973 Program of China under Grant No. 2013CB338002 and the National Natural Science Foundation of China under Grant Nos. 61272476, 61202420, and 61232009.
In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software ...