All Stories

  1. Cryptanalysis of the LSH hash functions
  2. Truncated differential based known-key attacks on round-reduced SIMON
  3. The Density of Different Dimensional Cubes in Cryptographic Primitives
  4. Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
  5. The Boomerang Attacks on BLAKE and BLAKE2
  6. A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique