Search dblp for Publications

export results for "stream:streams/journals/tosc:"

 download as .bib file

@article{DBLP:journals/tosc/BerendsenM24,
  author       = {Henk Berendsen and
                  Bart Mennink},
  title        = {Tightening Leakage Resilience of the Suffix Keyed Sponge},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {459--496},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.459-496},
  doi          = {10.46586/TOSC.V2024.I1.459-496},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BerendsenM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraM24,
  author       = {Christina Boura and
                  Kazuhiko Minematsu},
  title        = {Preface to Volume 2024, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {1--4},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.1-4},
  doi          = {10.46586/TOSC.V2024.I1.1-4},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenGHSMW24,
  author       = {Yuchao Chen and
                  Tingting Guo and
                  Lei Hu and
                  Lina Shang and
                  Shuping Mao and
                  Peng Wang},
  title        = {Small Stretch Problem of the {DCT} Scheme and How to Fix It},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {114--134},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.114-134},
  doi          = {10.46586/TOSC.V2024.I1.114-134},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenGHSMW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChoiLL24,
  author       = {Wonseok Choi and
                  Jooyoung Lee and
                  Yeongmin Lee},
  title        = {Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {35--70},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.35-70},
  doi          = {10.46586/TOSC.V2024.I1.35-70},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChoiLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezE24,
  author       = {Patrick Derbez and
                  Marie Euler},
  title        = {Equivalence of Generalised Feistel Networks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {412--440},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.412-440},
  doi          = {10.46586/TOSC.V2024.I1.412-440},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezFIRS24,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  Takanori Isobe and
                  Mostafizar Rahman and
                  Andr{\'{e}} Schrottenloher},
  title        = {Key Committing Attacks against AES-based {AEAD} Schemes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {135--157},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.135-157},
  doi          = {10.46586/TOSC.V2024.I1.135-157},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezFIRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DongGLPZ24,
  author       = {Xiaoyang Dong and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham and
                  Tianyu Zhang},
  title        = {Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {158--187},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.158-187},
  doi          = {10.46586/TOSC.V2024.I1.158-187},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DongGLPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourGSE24,
  author       = {Hosein Hadipour and
                  Simon Gerhalter and
                  Sadegh Sadeghi and
                  Maria Eichlseder},
  title        = {Improved Search for Integral, Impossible Differential and Zero-Correlation
                  Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, {PRESENT}
                  and QARMAv2},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {234--325},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.234-325},
  doi          = {10.46586/TOSC.V2024.I1.234-325},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourGSE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourT24,
  author       = {Hosein Hadipour and
                  Yosuke Todo},
  title        = {Cryptanalysis of QARMAv2},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {188--213},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.188-213},
  doi          = {10.46586/TOSC.V2024.I1.188-213},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KelseyLM24,
  author       = {John Kelsey and
                  Stefan Lucks and
                  Stephan M{\"{u}}ller},
  title        = {{XDRBG:} {A} Proposed Deterministic Random Bit Generator Based on
                  Any {XOF}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {5--34},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.5-34},
  doi          = {10.46586/TOSC.V2024.I1.5-34},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KelseyLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LefevreM24,
  author       = {Charlotte Lefevre and
                  Bart Mennink},
  title        = {Permutation-Based Hashing Beyond the Birthday Bound},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {71--113},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.71-113},
  doi          = {10.46586/TOSC.V2024.I1.71-113},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LefevreM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeurentP24,
  author       = {Ga{\"{e}}tan Leurent and
                  Clara Pernot},
  title        = {Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {441--458},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.441-458},
  doi          = {10.46586/TOSC.V2024.I1.441-458},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LeurentP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LingCHGHHX24,
  author       = {Qing Ling and
                  Tingting Cui and
                  Hongtao Hu and
                  Sijia Gong and
                  Zijun He and
                  Jiali Huang and
                  Jia Xiao},
  title        = {Finding Impossible Differentials in {ARX} Ciphers under Weak Keys},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {326--356},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.326-356},
  doi          = {10.46586/TOSC.V2024.I1.326-356},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LingCHGHHX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuKSM24,
  author       = {Fukang Liu and
                  Abul Kalam and
                  Santanu Sarkar and
                  Willi Meier},
  title        = {Algebraic Attack on FHE-Friendly Cipher {HERA} Using Multiple Collisions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {214--233},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.214-233},
  doi          = {10.46586/TOSC.V2024.I1.214-233},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuKSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Steiner24,
  author       = {Matthias Johann Steiner},
  title        = {Solving Degree Bounds for Iterated Polynomial Systems},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {357--411},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.357-411},
  doi          = {10.46586/TOSC.V2024.I1.357-411},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Steiner24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/StruckW24,
  author       = {Patrick Struck and
                  Maximiliane Weish{\"{a}}upl},
  title        = {Constructing Committing and Leakage-Resilient Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {497--528},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.497-528},
  doi          = {10.46586/TOSC.V2024.I1.497-528},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/StruckW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AvanziBDEGNR23,
  author       = {Roberto Avanzi and
                  Subhadeep Banik and
                  Orr Dunkelman and
                  Maria Eichlseder and
                  Shibam Ghosh and
                  Marcel Nageler and
                  Francesco Regazzoni},
  title        = {The QARMAv2 Family of Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {25--73},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.25-73},
  doi          = {10.46586/TOSC.V2023.I3.25-73},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AvanziBDEGNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BalachandranJNP23,
  author       = {Niranjan Balachandran and
                  Ashwin Jha and
                  Mridul Nandi and
                  Soumit Pal},
  title        = {Revisiting Randomness Extraction and Key Derivation Using the {CBC}
                  and Cascade Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {391--419},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.391-419},
  doi          = {10.46586/TOSC.V2023.I4.391-419},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BalachandranJNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaudrinFLNPS23,
  author       = {Jules Baudrin and
                  Patrick Felke and
                  Gregor Leander and
                  Patrick Neumann and
                  L{\'{e}}o Perrin and
                  Lukas Stennes},
  title        = {Commutative Cryptanalysis Made Practical},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {299--329},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.299-329},
  doi          = {10.46586/TOSC.V2023.I4.299-329},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BaudrinFLNPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BelliniGGMP23,
  author       = {Emanuele Bellini and
                  David G{\'{e}}rault and
                  Juan Grados and
                  Rusydi H. Makarim and
                  Thomas Peyrin},
  title        = {Boosting Differential-Linear Cryptanalysis of ChaCha7 with {MILP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {189--223},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.189-223},
  doi          = {10.46586/TOSC.V2023.I2.189-223},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BelliniGGMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BelliniGHR23,
  author       = {Emanuele Bellini and
                  David G{\'{e}}rault and
                  Anna Hambitzer and
                  Matteo Rossi},
  title        = {A Cipher-Agnostic Neural Training Pipeline with Automated Finding
                  of Good Input Differences},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {184--212},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.184-212},
  doi          = {10.46586/TOSC.V2023.I3.184-212},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BelliniGHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertiGPSS23,
  author       = {Francesco Berti and
                  Chun Guo and
                  Thomas Peters and
                  Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Message Authentication in the Presence of Leakage and Faults},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {288--315},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.288-315},
  doi          = {10.46586/TOSC.V2023.I1.288-315},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BertiGPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeyneV23,
  author       = {Tim Beyne and
                  Michiel Verbauwhede},
  title        = {Integral Cryptanalysis Using Algebraic Transition Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {244--269},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.244-269},
  doi          = {10.46586/TOSC.V2023.I4.244-269},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BeyneV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BoeufCP23,
  author       = {Aur{\'{e}}lien Boeuf and
                  Anne Canteaut and
                  L{\'{e}}o Perrin},
  title        = {Propagation of Subspaces in Primitives with Monomial Sboxes: Applications
                  to Rescue and Variants of the {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {270--298},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.270-298},
  doi          = {10.46586/TOSC.V2023.I4.270-298},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BoeufCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BonnetainL23,
  author       = {Xavier Bonnetain and
                  Virginie Lallemand},
  title        = {On Boomerang Attacks on Quadratic Feistel Ciphers New results on {KATAN}
                  and Simon},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {101--145},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.101-145},
  doi          = {10.46586/TOSC.V2023.I3.101-145},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BonnetainL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraDF23,
  author       = {Christina Boura and
                  Patrick Derbez and
                  Margot Funk},
  title        = {Related-Key Differential Analysis of the {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {215--243},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.215-243},
  doi          = {10.46586/TOSC.V2023.I4.215-243},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraDF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraM23,
  author       = {Christina Boura and
                  Bart Mennink},
  title        = {Preface to Volume 2023, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {1--4},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.1-4},
  doi          = {10.46586/TOSC.V2023.I1.1-4},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenFIIIMMNST23,
  author       = {Yu Long Chen and
                  Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Akiko Inoue and
                  Ryoma Ito and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Nicky Mouha and
                  Yusuke Naito and
                  Ferdinand Sibleyras and
                  Yosuke Todo},
  title        = {Key Committing Security of {AEZ} and More},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {452--488},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.452-488},
  doi          = {10.46586/TOSC.V2023.I4.452-488},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenFIIIMMNST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenGGLWWX23,
  author       = {Shiyao Chen and
                  Chun Guo and
                  Jian Guo and
                  Li Liu and
                  Meiqin Wang and
                  Puwen Wei and
                  Zeyu Xu},
  title        = {Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly
                  Symmetric-Key Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {132--175},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.132-175},
  doi          = {10.46586/TOSC.V2023.I2.132-175},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenGGLWWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CogliatiEJ23,
  author       = {Beno{\^{\i}}t Cogliati and
                  Jordan Ethan and
                  Ashwin Jha},
  title        = {Subverting Telegram's End-to-End Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {5--40},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.5-40},
  doi          = {10.46586/TOSC.V2023.I1.5-40},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CogliatiEJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CogliatiEJS23,
  author       = {Beno{\^{\i}}t Cogliati and
                  Jordan Ethan and
                  Ashwin Jha and
                  Soumya Kanti Saha},
  title        = {On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key
                  Mixing},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {330--364},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.330-364},
  doi          = {10.46586/TOSC.V2023.I4.330-364},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CogliatiEJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaDDM23,
  author       = {Nilanjan Datta and
                  Shreya Dey and
                  Avijit Dutta and
                  Sougata Mandal},
  title        = {Cascading Four Round {LRW1} is Beyond Birthday Bound Secure},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {365--390},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.365-390},
  doi          = {10.46586/TOSC.V2023.I4.365-390},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DattaDDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaDNT23,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Suprita Talnikar},
  title        = {Tight Multi-User Security Bound of DbHtS},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {192--223},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.192-223},
  doi          = {10.46586/TOSC.V2023.I1.192-223},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DattaDNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DeyGM23,
  author       = {Sabyasachi Dey and
                  Hirendra Kumar Garai and
                  Subhamoy Maitra},
  title        = {Cryptanalysis of Reduced Round ChaCha - New Attack {\&} Deeper
                  Analysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {89--110},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.89-110},
  doi          = {10.46586/TOSC.V2023.I1.89-110},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DeyGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigMN23,
  author       = {Christoph Dobraunig and
                  Bart Mennink and
                  Samuel Neves},
  title        = {EliMAC: Speeding Up LightMAC by around 20{\%}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {69--93},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.69-93},
  doi          = {10.46586/TOSC.V2023.I2.69-93},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DunkelmanGL23,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Eran Lambooij},
  title        = {Attacking the {IETF/ISO} Standard for Internal Re-keying {CTR-ACPKM}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {41--66},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.41-66},
  doi          = {10.46586/TOSC.V2023.I1.41-66},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DunkelmanGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DunkelmanGL23a,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Eran Lambooij},
  title        = {Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {176--188},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.176-188},
  doi          = {10.46586/TOSC.V2023.I2.176-188},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DunkelmanGL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GhoshAD23,
  author       = {Koustabh Ghosh and
                  Parisa Amiri{-}Eliasi and
                  Joan Daemen},
  title        = {Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.1-24},
  doi          = {10.46586/TOSC.V2023.I3.1-24},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GhoshAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Grassi23,
  author       = {Lorenzo Grassi},
  title        = {Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly
                  Symmetric Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {94--131},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.94-131},
  doi          = {10.46586/TOSC.V2023.I2.94-131},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Grassi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeanderRS23,
  author       = {Gregor Leander and
                  Shahram Rasoolzadeh and
                  Lukas Stennes},
  title        = {Cryptanalysis of {HALFLOOP} Block Ciphers Destroying {HALFLOOP-24}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {58--82},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.58-82},
  doi          = {10.46586/TOSC.V2023.I4.58-82},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LeanderRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Lefevre23,
  author       = {Charlotte Lefevre},
  title        = {Indifferentiability of the Sponge Construction with a Restricted Number
                  of Message Blocks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {224--243},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.224-243},
  doi          = {10.46586/TOSC.V2023.I1.224-243},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Lefevre23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiHCGQ23,
  author       = {Huina Li and
                  Le He and
                  Shiyao Chen and
                  Jian Guo and
                  Weidong Qiu},
  title        = {Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess
                  Approach},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {74--100},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.74-100},
  doi          = {10.46586/TOSC.V2023.I3.74-100},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiHCGQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiLW23,
  author       = {Yingxin Li and
                  Fukang Liu and
                  Gaoli Wang},
  title        = {Automating Collision Attacks on {RIPEMD-160}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {112--142},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.112-142},
  doi          = {10.46586/TOSC.V2023.I4.112-142},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuMOM23,
  author       = {Fukang Liu and
                  Mohammad Mahzoun and
                  Morten {\O}ygarden and
                  Willi Meier},
  title        = {Algebraic Attacks on {RAIN} and {AIM} Using Equivalent Representations},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {166--186},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.166-186},
  doi          = {10.46586/TOSC.V2023.I4.166-186},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuMOM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MellaDA23,
  author       = {Silvia Mella and
                  Joan Daemen and
                  Gilles Van Assche},
  title        = {Tighter Trail Bounds for Xoodoo},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {187--214},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.187-214},
  doi          = {10.46586/TOSC.V2023.I4.187-214},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MellaDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Mennink23,
  author       = {Bart Mennink},
  title        = {Understanding the Duplex and Its Security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {1--46},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.1-46},
  doi          = {10.46586/TOSC.V2023.I2.1-46},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Mennink23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MondalRSA23,
  author       = {Sandip Kumar Mondal and
                  Mostafizar Rahman and
                  Santanu Sarkar and
                  Avishek Adhikari},
  title        = {Revisiting Yoyo Tricks on {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {28--57},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.28-57},
  doi          = {10.46586/TOSC.V2023.I4.28-57},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MondalRSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NagelerPE23,
  author       = {Marcel Nageler and
                  Felix Pallua and
                  Maria Eichlseder},
  title        = {Finding Collisions for Round-Reduced Romulus-H},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {67--88},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.67-88},
  doi          = {10.46586/TOSC.V2023.I1.67-88},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/NagelerPE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NaitoSS23,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara},
  title        = {Committing Security of Ascon: Cryptanalysis on Primitive and Proof
                  on Mode},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {420--451},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.420-451},
  doi          = {10.46586/TOSC.V2023.I4.420-451},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/NaitoSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/OzdemirBR23,
  author       = {Bet{\"{u}}l Askin {\"{O}}zdemir and
                  Tim Beyne and
                  Vincent Rijmen},
  title        = {Multidimensional Linear Cryptanalysis of Feistel Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {1--27},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.1-27},
  doi          = {10.46586/TOSC.V2023.I4.1-27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/OzdemirBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Rasoolzadeh23,
  author       = {Shahram Rasoolzadeh},
  title        = {Classification of All t-Resilient Boolean Functions with t + 4 Variables},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {213--226},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.213-226},
  doi          = {10.46586/TOSC.V2023.I3.213-226},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Rasoolzadeh23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SchrottenloherS23,
  author       = {Andr{\'{e}} Schrottenloher and
                  Marc Stevens},
  title        = {Simplified Modeling of {MITM} Attacks for Block Ciphers: New (Quantum)
                  Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {146--183},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.146-183},
  doi          = {10.46586/TOSC.V2023.I3.146-183},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SchrottenloherS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ShenS23,
  author       = {Yaobin Shen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit
                  Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {47--68},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.47-68},
  doi          = {10.46586/TOSC.V2023.I2.47-68},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ShenS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ShiFX23,
  author       = {Haotian Shi and
                  Xiutao Feng and
                  Shengyuan Xu},
  title        = {A Framework with Improved Heuristics to Optimize Low-Latency Implementations
                  of Linear Layers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {489--510},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.489-510},
  doi          = {10.46586/TOSC.V2023.I4.489-510},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ShiFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunCW23,
  author       = {Yimeng Sun and
                  Jiamin Cui and
                  Meiqin Wang},
  title        = {Improved Attacks on LowMC with Algebraic Techniques},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {143--165},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.143-165},
  doi          = {10.46586/TOSC.V2023.I4.143-165},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SunCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunW23,
  author       = {Ling Sun and
                  Meiqin Wang},
  title        = {SoK: Modeling for Large S-boxes Oriented to Differential Probabilities
                  and Linear Correlations},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {111--151},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.111-151},
  doi          = {10.46586/TOSC.V2023.I1.111-151},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WangWS23,
  author       = {Dachao Wang and
                  Baocang Wang and
                  Siwei Sun},
  title        = {SAT-aided Automatic Search of Boomerang Distinguishers for {ARX} Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {152--191},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.152-191},
  doi          = {10.46586/TOSC.V2023.I1.152-191},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/WangWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/XuDG23,
  author       = {Shanjie Xu and
                  Qi Da and
                  Chun Guo},
  title        = {Chosen-Key Secure Even-Mansour Cipher from a Single Permutation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {244--287},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.244-287},
  doi          = {10.46586/TOSC.V2023.I1.244-287},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/XuDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangLGJ23,
  author       = {Bin Zhang and
                  Ruitao Liu and
                  Xinxin Gong and
                  Lin Jiao},
  title        = {Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {83--111},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.83-111},
  doi          = {10.46586/TOSC.V2023.I4.83-111},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangLGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangSWH23,
  author       = {Zhiyu Zhang and
                  Siwei Sun and
                  Caibing Wang and
                  Lei Hu},
  title        = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like
                  Hashing},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {224--252},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.224-252},
  doi          = {10.46586/TOSC.V2023.I2.224-252},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangSWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Banfi22,
  author       = {Fabio Banfi},
  title        = {{SCB} Mode: Semantically Secure Length-Preserving Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.1-23},
  doi          = {10.46586/TOSC.V2022.I4.1-23},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Banfi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Banik22,
  author       = {Subhadeep Banik},
  title        = {Cryptanalysis of Draco},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {92--104},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.92-104},
  doi          = {10.46586/TOSC.V2022.I4.92-104},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Banik22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BardehR22,
  author       = {Navid Ghaedi Bardeh and
                  Vincent Rijmen},
  title        = {New Key-Recovery Attack on Reduced-Round {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {43--62},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.43-62},
  doi          = {10.46586/TOSC.V2022.I2.43-62},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BardehR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BariantBLP22,
  author       = {Augustin Bariant and
                  Cl{\'{e}}mence Bouvier and
                  Ga{\"{e}}tan Leurent and
                  L{\'{e}}o Perrin},
  title        = {Algebraic Attacks against Some Arithmetization-Oriented Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {73--101},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.73-101},
  doi          = {10.46586/TOSC.V2022.I3.73-101},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BariantBLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaudrinCP22,
  author       = {Jules Baudrin and
                  Anne Canteaut and
                  L{\'{e}}o Perrin},
  title        = {Practical Cube Attack against Nonce-Misused Ascon},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {120--144},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.120-144},
  doi          = {10.46586/TOSC.V2022.I4.120-144},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BaudrinCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeierleFLR22,
  author       = {Christof Beierle and
                  Patrick Felke and
                  Gregor Leander and
                  Sondre R{\o}njom},
  title        = {Decomposing Linear Layers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {243--265},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.243-265},
  doi          = {10.46586/TOSC.V2022.I4.243-265},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BeierleFLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeyneL22,
  author       = {Tim Beyne and
                  Yunwen Liu},
  title        = {Truncated Differential Attacks on Contracting Feistel Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {141--160},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.141-160},
  doi          = {10.46586/TOSC.V2022.I2.141-160},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BeyneL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BrianFRV22,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Jo{\~{a}}o Ribeiro and
                  Daniele Venturi},
  title        = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.1-19},
  doi          = {10.46586/TOSC.V2022.I3.1-19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BrianFRV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CidGGLRS22,
  author       = {Carlos Cid and
                  Lorenzo Grassi and
                  Aldo Gunsing and
                  Reinhard L{\"{u}}ftenegger and
                  Christian Rechberger and
                  Markus Schofnegger},
  title        = {Influence of the Linear Layer on the Algebraic Degree in SP-Networks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {110--137},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.110-137},
  doi          = {10.46586/TOSC.V2022.I1.110-137},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CidGGLRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DansarieDLS22,
  author       = {Marcus Dansarie and
                  Patrick Derbez and
                  Gregor Leander and
                  Lukas Stennes},
  title        = {Breaking {HALFLOOP-24}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {217--238},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.217-238},
  doi          = {10.46586/TOSC.V2022.I3.217-238},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DansarieDLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezL22,
  author       = {Patrick Derbez and
                  Baptiste Lambin},
  title        = {Fast {MILP} Models for Division Property},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {289--321},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.289-321},
  doi          = {10.46586/TOSC.V2022.I2.289-321},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DinurM22,
  author       = {Itai Dinur and
                  Bart Mennink},
  title        = {Preface to Volume 2022, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {1--4},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.1-4},
  doi          = {10.46586/TOSC.V2022.I1.1-4},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DinurM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ErlacherME22,
  author       = {Johannes Erlacher and
                  Florian Mendel and
                  Maria Eichlseder},
  title        = {Bounds for the Security of Ascon against Differential and Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {64--87},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.64-87},
  doi          = {10.46586/TOSC.V2022.I1.64-87},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ErlacherME22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GrassiKRS22,
  author       = {Lorenzo Grassi and
                  Dmitry Khovratovich and
                  Sondre R{\o}njom and
                  Markus Schofnegger},
  title        = {The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes
                  over Fnp Preimage Attack on Full Grendel},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {5--37},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.5-37},
  doi          = {10.46586/TOSC.V2022.I1.5-37},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GrassiKRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GrassiOPS22,
  author       = {Lorenzo Grassi and
                  Silvia Onofri and
                  Marco Pedicini and
                  Luca Sozzi},
  title        = {Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes
                  over Fnp Application to Poseidon},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {20--72},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.20-72},
  doi          = {10.46586/TOSC.V2022.I3.20-72},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GrassiOPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourE22,
  author       = {Hosein Hadipour and
                  Maria Eichlseder},
  title        = {Integral Cryptanalysis of {WARP} based on Monomial Prediction},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {92--112},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.92-112},
  doi          = {10.46586/TOSC.V2022.I2.92-112},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourNE22,
  author       = {Hosein Hadipour and
                  Marcel Nageler and
                  Maria Eichlseder},
  title        = {Throwing Boomerangs into Feistel Structures Application to CLEFIA,
                  WARP, LBlock, LBlock-s and {TWINE}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {271--302},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.271-302},
  doi          = {10.46586/TOSC.V2022.I3.271-302},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourNE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HamannMKM22,
  author       = {Matthias Hamann and
                  Alexander Moch and
                  Matthias Krause and
                  Vasily Mikhalev},
  title        = {The {DRACO} Stream Cipher {A} Power-efficient Small-state Stream Cipher
                  with Full Provable Security against {TMDTO} Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {1--42},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.1-42},
  doi          = {10.46586/TOSC.V2022.I2.1-42},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HamannMKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HirchMMD22,
  author       = {Solane El Hirch and
                  Silvia Mella and
                  Alireza Mehrdad and
                  Joan Daemen},
  title        = {Improved Differential and Linear Trail Bounds for {ASCON}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {145--178},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.145-178},
  doi          = {10.46586/TOSC.V2022.I4.145-178},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HirchMMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HosoyamadaIIIMS22,
  author       = {Akinori Hosoyamada and
                  Akiko Inoue and
                  Ryoma Ito and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Ferdinand Sibleyras and
                  Yosuke Todo},
  title        = {Cryptanalysis of Rocca and Feasibility of Its Security Claim},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {123--151},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.123-151},
  doi          = {10.46586/TOSC.V2022.I3.123-151},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HosoyamadaIIIMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuaDSZHW22,
  author       = {Jialiang Hua and
                  Xiaoyang Dong and
                  Siwei Sun and
                  Zhiyu Zhang and
                  Lei Hu and
                  Xiaoyun Wang},
  title        = {Improved {MITM} Cryptanalysis on Streebog},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {63--91},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.63-91},
  doi          = {10.46586/TOSC.V2022.I2.63-91},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HuaDSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuangBDM22,
  author       = {Senyang Huang and
                  Orna Agmon Ben{-}Yehuda and
                  Orr Dunkelman and
                  Alexander Maximov},
  title        = {Finding Collisions against 4-Round {SHA-3-384} in Practical Time},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {239--270},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.239-270},
  doi          = {10.46586/TOSC.V2022.I3.239-270},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HuangBDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/JohanssonMN22,
  author       = {Thomas Johansson and
                  Willi Meier and
                  Vu Nguyen},
  title        = {Attacks on the Firekite Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {191--216},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.191-216},
  doi          = {10.46586/TOSC.V2022.I3.191-216},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/JohanssonMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Khairallah22,
  author       = {Mustafa Khairallah},
  title        = {Security of {COFB} against Chosen Ciphertext Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {138--157},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.138-157},
  doi          = {10.46586/TOSC.V2022.I1.138-157},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Khairallah22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KidmoseT22,
  author       = {Andreas B. Kidmose and
                  Tyge Tiessen},
  title        = {A Formal Analysis of Boomerang Probabilities},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {88--109},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.88-109},
  doi          = {10.46586/TOSC.V2022.I1.88-109},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/KidmoseT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KimHSH22,
  author       = {Seonggyeom Kim and
                  Deukjo Hong and
                  Jaechul Sung and
                  Seokhie Hong},
  title        = {Accelerating the Best Trail Search on AES-Like Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {201--252},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.201-252},
  doi          = {10.46586/TOSC.V2022.I2.201-252},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/KimHSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LallemandMR22,
  author       = {Virginie Lallemand and
                  Marine Minier and
                  Lo{\"{\i}}c Rouquette},
  title        = {Automatic Search of Rectangle Attacks on Feistel Ciphers: Application
                  to {WARP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {113--140},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.113-140},
  doi          = {10.46586/TOSC.V2022.I2.113-140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LallemandMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeanderR22,
  author       = {Gregor Leander and
                  Shahram Rasoolzadeh},
  title        = {Weak Tweak-Keys for the {CRAFT} Block Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {38--63},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.38-63},
  doi          = {10.46586/TOSC.V2022.I1.38-63},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LeanderR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiMSW22,
  author       = {Muzhou Li and
                  Nicky Mouha and
                  Ling Sun and
                  Meiqin Wang},
  title        = {Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls:
                  Application to TinyJAMBU},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {161--200},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.161-200},
  doi          = {10.46586/TOSC.V2022.I2.161-200},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiMSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiS22,
  author       = {Ting Li and
                  Yao Sun},
  title        = {SuperBall: {A} New Approach for {MILP} Modelings of Boolean Functions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {341--367},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.341-367},
  doi          = {10.46586/TOSC.V2022.I3.341-367},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuMSI22,
  author       = {Fukang Liu and
                  Willi Meier and
                  Santanu Sarkar and
                  Takanori Isobe},
  title        = {New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {102--122},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.102-122},
  doi          = {10.46586/TOSC.V2022.I3.102-122},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuMSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuMSWII22,
  author       = {Fukang Liu and
                  Willi Meier and
                  Santanu Sarkar and
                  Gaoli Wang and
                  Ryoma Ito and
                  Takanori Isobe},
  title        = {New Cryptanalysis of {ZUC-256} Initialization Using Modular Differences},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {152--190},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.152-190},
  doi          = {10.46586/TOSC.V2022.I3.152-190},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuMSWII22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuWFWSW22,
  author       = {Qun Liu and
                  Weijia Wang and
                  Yanhong Fan and
                  Lixuan Wu and
                  Ling Sun and
                  Meiqin Wang},
  title        = {Towards Low-Latency Implementation of Linear Layers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {158--182},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.158-182},
  doi          = {10.46586/TOSC.V2022.I1.158-182},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuWFWSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuWSFWW22,
  author       = {Qun Liu and
                  Weijia Wang and
                  Ling Sun and
                  Yanhong Fan and
                  Lixuan Wu and
                  Meiqin Wang},
  title        = {More Inputs Makes Difference: Implementations of Linear Layers Using
                  Gates with More Than Two Inputs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {351--378},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.351-378},
  doi          = {10.46586/TOSC.V2022.I2.351-378},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuWSFWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MakarimR22,
  author       = {Rusydi H. Makarim and
                  Raghvendra Rohit},
  title        = {Towards Tight Differential Bounds of Ascon {A} Hybrid Usage of {SMT}
                  and {MILP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {303--340},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.303-340},
  doi          = {10.46586/TOSC.V2022.I3.303-340},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MakarimR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MaramMPR22,
  author       = {Varun Maram and
                  Daniel Masny and
                  Sikhar Patranabis and
                  Srinivasan Raghuraman},
  title        = {On the Quantum Security of {OCB}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {379--414},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.379-414},
  doi          = {10.46586/TOSC.V2022.I2.379-414},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MaramMPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MayS22,
  author       = {Alexander May and
                  Lars Schlieper},
  title        = {Quantum Period Finding is Compression Robust},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {183--211},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.183-211},
  doi          = {10.46586/TOSC.V2022.I1.183-211},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MayS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MehrdadMGD22,
  author       = {Alireza Mehrdad and
                  Silvia Mella and
                  Lorenzo Grassi and
                  Joan Daemen},
  title        = {Differential Trail Search in Cryptographic Primitives with Big-Circle
                  Chi: Application to Subterranean},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {253--288},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.253-288},
  doi          = {10.46586/TOSC.V2022.I2.253-288},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MehrdadMGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NakayaI22,
  author       = {Kazuki Nakaya and
                  Tetsu Iwata},
  title        = {Generalized Feistel Structures Based on Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {24--91},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.24-91},
  doi          = {10.46586/TOSC.V2022.I4.24-91},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/NakayaI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/PeyrinT22,
  author       = {Thomas Peyrin and
                  Quan Quan Tan},
  title        = {Mind Your Path: On (Key) Dependencies in Differential Characteristics},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {179--207},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.179-207},
  doi          = {10.46586/TOSC.V2022.I4.179-207},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/PeyrinT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Rasoolzadeh22,
  author       = {Shahram Rasoolzadeh},
  title        = {Low-Latency Boolean Functions and Bijective S-boxes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {403--447},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.403-447},
  doi          = {10.46586/TOSC.V2022.I3.403-447},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Rasoolzadeh22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SahaKP22,
  author       = {Sayandeep Saha and
                  Mustafa Khairallah and
                  Thomas Peyrin},
  title        = {Exploring Integrity of AEADs with Faults: Definitions and Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {291--324},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.291-324},
  doi          = {10.46586/TOSC.V2022.I4.291-324},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SahaKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunWW22,
  author       = {Ling Sun and
                  Wei Wang and
                  Meiqin Wang},
  title        = {Addendum to Linear Cryptanalyses of Three AEADs with {GIFT-128} as
                  Underlying Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {1},
  pages        = {212--219},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i1.212-219},
  doi          = {10.46586/TOSC.V2022.I1.212-219},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/TodoI22,
  author       = {Yosuke Todo and
                  Takanori Isobe},
  title        = {Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi
                  and SPNbox},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {368--402},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.368-402},
  doi          = {10.46586/TOSC.V2022.I3.368-402},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/TodoI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/VenkateswarluKS22,
  author       = {Ayineedi Venkateswarlu and
                  Abhishek Kesarwani and
                  Sumanta Sarkar},
  title        = {On the Lower Bound of Cost of {MDS} Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {266--290},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.266-290},
  doi          = {10.46586/TOSC.V2022.I4.266-290},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/VenkateswarluKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WangFHGS22,
  author       = {Senpeng Wang and
                  Dengguo Feng and
                  Bin Hu and
                  Jie Guan and
                  Tairong Shi},
  title        = {Practical Attacks on Full-round {FRIET}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {105--119},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.105-119},
  doi          = {10.46586/TOSC.V2022.I4.105-119},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/WangFHGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YangSSSH22,
  author       = {Qianqian Yang and
                  Ling Song and
                  Siwei Sun and
                  Danping Shi and
                  Lei Hu},
  title        = {New Properties of the Double Boomerang Connectivity Table},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {208--242},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.208-242},
  doi          = {10.46586/TOSC.V2022.I4.208-242},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YangSSSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhouFZ22,
  author       = {Zhaocun Zhou and
                  Dengguo Feng and
                  Bin Zhang},
  title        = {Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications
                  to Stream Cipher Grain-128a},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {322--350},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.322-350},
  doi          = {10.46586/TOSC.V2022.I2.322-350},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhouFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001021,
  author       = {Raghvendra Rohit and
                  Santanu Sarkar},
  title        = {Diving Deep into the Weak Keys of Round Reduced Ascon},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {74--99},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.74-99},
  doi          = {10.46586/TOSC.V2021.I4.74-99},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001BJL021,
  author       = {Zheng Yang and
                  Zhiting Bao and
                  Chenglu Jin and
                  Zhe Liu and
                  Jianying Zhou},
  title        = {PLCrypto: {A} Symmetric Cryptographic Library for Programmable Logic
                  Controllers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {170--217},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.170-217},
  doi          = {10.46586/TOSC.V2021.I3.170-217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001BJL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001BPV21,
  author       = {Elena Andreeva and
                  Amit Singh Bhati and
                  Bart Preneel and
                  Damian Viz{\'{a}}r},
  title        = {1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {1--35},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.1-35},
  doi          = {10.46586/TOSC.V2021.I3.1-35},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001BPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/000421,
  author       = {Yao Sun},
  title        = {Automatic Search of Cubes for Attacking Stream Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {100--123},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.100-123},
  doi          = {10.46586/TOSC.V2021.I4.100-123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/000421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/00250M21,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Improved guess-and-determine and distinguishing attacks on {SNOW-V}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {54--83},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.54-83},
  doi          = {10.46586/TOSC.V2021.I3.54-83},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/00250M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikCILMSS21,
  author       = {Subhadeep Banik and
                  Andrea Caforio and
                  Takanori Isobe and
                  Fukang Liu and
                  Willi Meier and
                  Kosei Sakamoto and
                  Santanu Sarkar},
  title        = {Atom: {A} Stream Cipher with Double Key Filter},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {5--36},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.5-36},
  doi          = {10.46586/TOSC.V2021.I1.5-36},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikCILMSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikILMS21,
  author       = {Subhadeep Banik and
                  Takanori Isobe and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Kosei Sakamoto},
  title        = {Orthros: {A} Low-Latency {PRF}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {37--77},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.37-77},
  doi          = {10.46586/TOSC.V2021.I1.37-77},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikILMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BoissierNR21,
  author       = {Rachelle Heim Boissier and
                  Camille No{\^{u}}s and
                  Yann Rotella},
  title        = {Algebraic Collision Attacks on Keccak},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {239--268},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.239-268},
  doi          = {10.46586/TOSC.V2021.I1.239-268},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BoissierNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BronchainFLLPS21,
  author       = {Olivier Bronchain and
                  Sebastian Faust and
                  Virginie Lallemand and
                  Gregor Leander and
                  L{\'{e}}o Perrin and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {{MOE:} Multiplication Operated Encryption with Trojan Resilience},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {78--129},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.78-129},
  doi          = {10.46586/TOSC.V2021.I1.78-129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BronchainFLLPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CaforioBTM0L021,
  author       = {Andrea Caforio and
                  Subhadeep Banik and
                  Yosuke Todo and
                  Willi Meier and
                  Takanori Isobe and
                  Fukang Liu and
                  Bin Zhang},
  title        = {Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {36--73},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.36-73},
  doi          = {10.46586/TOSC.V2021.I4.36-73},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CaforioBTM0L021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortyCJN21,
  author       = {Bishwajit Chakraborty and
                  Soumya Chattopadhyay and
                  Ashwin Jha and
                  Mridul Nandi},
  title        = {On Length Independent Security Bounds for the {PMAC} Family},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {423--445},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.423-445},
  doi          = {10.46586/TOSC.V2021.I2.423-445},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortyCJN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChauhanKS21,
  author       = {Amit Kumar Chauhan and
                  Abhishek Kumar and
                  Somitra Kumar Sanadhya},
  title        = {Quantum Free-Start Collision Attacks on Double Block Length Hashing
                  with Round-Reduced {AES-256}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {316--336},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.316-336},
  doi          = {10.46586/TOSC.V2021.I1.316-336},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChauhanKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenXZZ21,
  author       = {Siwei Chen and
                  Zejun Xiang and
                  Xiangyong Zeng and
                  Shasha Zhang},
  title        = {On the Relationships between Different Methods for Degree Evaluation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {411--442},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.411-442},
  doi          = {10.46586/TOSC.V2021.I1.411-442},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenXZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CogliatiELL0M21,
  author       = {Beno{\^{\i}}t Cogliati and
                  Jordan Ethan and
                  Virginie Lallemand and
                  ByeongHak Lee and
                  Jooyoung Lee and
                  Marine Minier},
  title        = {{CTET+:} {A} Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme
                  Using a Single Pseudorandom Permutation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {1--35},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.1-35},
  doi          = {10.46586/TOSC.V2021.I4.1-35},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CogliatiELL0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Dansarie21,
  author       = {Marcus Dansarie},
  title        = {Cryptanalysis of the SoDark Cipher for {HF} Radio Automatic Link Establishment},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {36--53},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.36-53},
  doi          = {10.46586/TOSC.V2021.I3.36-53},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Dansarie21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaDD21,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Kushankur Dutta},
  title        = {Improved Security Bound of {(E/D)WCDM}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {138--176},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.138-176},
  doi          = {10.46586/TOSC.V2021.I4.138-176},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DattaDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DuttaNT21,
  author       = {Avijit Dutta and
                  Mridul Nandi and
                  Suprita Talnikar},
  title        = {Permutation Based {EDM:} An Inverse Free {BBB} Secure {PRF}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {31--70},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.31-70},
  doi          = {10.46586/TOSC.V2021.I2.31-70},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DuttaNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GeraultPT21,
  author       = {David G{\'{e}}rault and
                  Thomas Peyrin and
                  Quan Quan Tan},
  title        = {Exploring Differential-Based Distinguishers and Forgeries for {ASCON}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {102--136},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.102-136},
  doi          = {10.46586/TOSC.V2021.I3.102-136},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GeraultPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GjiritiRV21,
  author       = {Emiljano Gjiriti and
                  Reza Reyhanitabar and
                  Damian Viz{\'{a}}r},
  title        = {Power Yoga: Variable-Stretch Security of {CCM} for Energy-Efficient
                  Lightweight IoT},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {446--468},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.446-468},
  doi          = {10.46586/TOSC.V2021.I2.446-468},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GjiritiRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GongZ21,
  author       = {Xinxin Gong and
                  Bin Zhang},
  title        = {Resistance of {SNOW-V} against Fast Correlation Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {378--410},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.378-410},
  doi          = {10.46586/TOSC.V2021.I1.378-410},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GongZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GongZ21a,
  author       = {Xinxin Gong and
                  Bin Zhang},
  title        = {Comparing Large-unit and Bitwise Linear Approximations of {SNOW} 2.0
                  and {SNOW} 3G and Related Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {71--103},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.71-103},
  doi          = {10.46586/TOSC.V2021.I2.71-103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GongZ21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GrassiRS21,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Markus Schofnegger},
  title        = {Proving Resistance Against Infinitely Long Subspace Trails: How to
                  Choose the Linear Layer},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {314--352},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.314-352},
  doi          = {10.46586/TOSC.V2021.I2.314-352},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GrassiRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoSWWY21,
  author       = {Chun Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Weijia Wang and
                  Xiao Wang and
                  Yu Yu},
  title        = {Provable Security of {SP} Networks with Partial Non-Linear Layers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {353--388},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.353-388},
  doi          = {10.46586/TOSC.V2021.I2.353-388},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoSWWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourBS21,
  author       = {Hosein Hadipour and
                  Nasour Bagheri and
                  Ling Song},
  title        = {Improved Rectangle Attacks on {SKINNY} and {CRAFT}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {140--198},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.140-198},
  doi          = {10.46586/TOSC.V2021.I2.140-198},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HeLY21,
  author       = {Le He and
                  Xiaoen Lin and
                  Hongbo Yu},
  title        = {Improved Preimage Attacks on 4-Round Keccak-224/256},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {217--238},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.217-238},
  doi          = {10.46586/TOSC.V2021.I1.217-238},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HeLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HodgesS21,
  author       = {Philip W. Hodges and
                  Douglas Stebila},
  title        = {Algorithm Substitution Attacks: State Reset Detection and Asymmetric
                  Modifications},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {389--422},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.389-422},
  doi          = {10.46586/TOSC.V2021.I2.389-422},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HodgesS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HosoyamadaI21,
  author       = {Akinori Hosoyamada and
                  Tetsu Iwata},
  title        = {Provably Quantum-Secure Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {337--377},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.337-377},
  doi          = {10.46586/TOSC.V2021.I1.337-377},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HosoyamadaI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LinHY21,
  author       = {Xiaoen Lin and
                  Le He and
                  Hongbo Yu},
  title        = {Improved Preimage Attacks on 3-Round Keccak-224/256},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {84--101},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.84-101},
  doi          = {10.46586/TOSC.V2021.I3.84-101},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LinHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuIM21,
  author       = {Fukang Liu and
                  Takanori Isobe and
                  Willi Meier},
  title        = {Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage
                  Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {185--216},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.185-216},
  doi          = {10.46586/TOSC.V2021.I1.185-216},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuIM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuIMS21,
  author       = {Fukang Liu and
                  Takanori Isobe and
                  Willi Meier and
                  Kosei Sakamoto},
  title        = {Weak Keys in Reduced {AEGIS} and Tiaoxin},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {104--139},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.104-139},
  doi          = {10.46586/TOSC.V2021.I2.104-139},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuIMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MouhaKASPTBITZ21,
  author       = {Nicky Mouha and
                  Nikolay Kolomeec and
                  Danil Akhtiamov and
                  Ivan Sutormin and
                  Matvey Panferov and
                  Kseniya Titova and
                  Tatiana Bonich and
                  Evgeniya Ishchukova and
                  Natalia N. Tokareva and
                  Bulat Zhantulikov},
  title        = {Maximums of the Additive Differential Probability of Exclusive-Or},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {292--313},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.292-313},
  doi          = {10.46586/TOSC.V2021.I2.292-313},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MouhaKASPTBITZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NiDJY21,
  author       = {Boyu Ni and
                  Xiaoyang Dong and
                  Keting Jia and
                  Qidi You},
  title        = {(Quantum) Collision Attacks on Reduced Simpira v2},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {222--248},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.222-248},
  doi          = {10.46586/TOSC.V2021.I2.222-248},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/NiDJY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Nyberg21,
  author       = {Kaisa Nyberg},
  title        = {Statistical Model of Correlation Difference and Related-Key Linear
                  Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {4},
  pages        = {124--137},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i4.124-137},
  doi          = {10.46586/TOSC.V2021.I4.124-137},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Nyberg21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/QinDWJL21,
  author       = {Lingyue Qin and
                  Xiaoyang Dong and
                  Xiaoyun Wang and
                  Keting Jia and
                  Yunwen Liu},
  title        = {Automated Search Oriented to Key Recovery on Ciphers with Linear Key
                  Schedule Applications to Boomerangs in {SKINNY} and ForkSkinny},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {249--291},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.249-291},
  doi          = {10.46586/TOSC.V2021.I2.249-291},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/QinDWJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/RahmanS021,
  author       = {Mostafizar Rahman and
                  Dhiman Saha and
                  Goutam Paul},
  title        = {Boomeyong: Embedding Yoyo within Boomerang and its Applications to
                  Key Recovery Attacks on {AES} and Pholkos},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {137--169},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.137-169},
  doi          = {10.46586/TOSC.V2021.I3.137-169},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/RahmanS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/RohitHSS21,
  author       = {Raghvendra Rohit and
                  Kai Hu and
                  Sumanta Sarkar and
                  Siwei Sun},
  title        = {Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {130--155},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.130-155},
  doi          = {10.46586/TOSC.V2021.I1.130-155},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/RohitHSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SakamotoLNKI21,
  author       = {Kosei Sakamoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Takanori Isobe},
  title        = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {1--30},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.1-30},
  doi          = {10.46586/TOSC.V2021.I2.1-30},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SakamotoLNKI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunWW21,
  author       = {Ling Sun and
                  Wei Wang and
                  Meiqin Wang},
  title        = {Accelerating the Search of Differential and Linear Characteristics
                  with the {SAT} Method},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {269--315},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.269-315},
  doi          = {10.46586/TOSC.V2021.I1.269-315},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunWW21a,
  author       = {Ling Sun and
                  Wei Wang and
                  Meiqin Wang},
  title        = {Linear Cryptanalyses of Three AEADs with {GIFT-128} as Underlying
                  Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {199--221},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.199-221},
  doi          = {10.46586/TOSC.V2021.I2.199-221},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunWW21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZongDCLWL21,
  author       = {Rui Zong and
                  Xiaoyang Dong and
                  Huaifeng Chen and
                  Yiyuan Luo and
                  Si Wang and
                  Zheng Li},
  title        = {Towards Key-recovery-attack Friendly Distinguishers: Application to
                  {GIFT-128}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {156--184},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.156-184},
  doi          = {10.46586/TOSC.V2021.I1.156-184},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ZongDCLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AlTawyGMR20,
  author       = {Riham AlTawy and
                  Guang Gong and
                  Kalikinkar Mandal and
                  Raghvendra Rohit},
  title        = {{WAGE:} An Authenticated Encryption with a Twist},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {132--159},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.132-159},
  doi          = {10.13154/TOSC.V2020.IS1.132-159},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AlTawyGMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AlyABDS20,
  author       = {Abdelrahaman Aly and
                  Tomer Ashur and
                  Eli Ben{-}Sasson and
                  Siemen Dhooghe and
                  Alan Szepieniec},
  title        = {Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {1--45},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.1-45},
  doi          = {10.13154/TOSC.V2020.I3.1-45},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AlyABDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikBDV20,
  author       = {Subhadeep Banik and
                  Khashayar Barooti and
                  F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  title        = {Cryptanalysis of LowMC instances using single plaintext/ciphertext
                  pair},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {130--146},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.130-146},
  doi          = {10.46586/TOSC.V2020.I4.130-146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikBDV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikBRV20,
  author       = {Subhadeep Banik and
                  Fatih Balli and
                  Francesco Regazzoni and
                  Serge Vaudenay},
  title        = {Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {185--232},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.185-232},
  doi          = {10.13154/TOSC.V2020.I1.185-232},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikBRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGL20,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Eik List},
  title        = {Extended Truncated-differential Distinguishers on Round-reduced {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {197--261},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.197-261},
  doi          = {10.13154/TOSC.V2020.I3.197-261},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BariantDL20,
  author       = {Augustin Bariant and
                  Nicolas David and
                  Ga{\"{e}}tan Leurent},
  title        = {Cryptanalysis of Forkciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {233--265},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.233-265},
  doi          = {10.13154/TOSC.V2020.I1.233-265},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BariantDL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeierleBSGPUVW20,
  author       = {Christof Beierle and
                  Alex Biryukov and
                  Luan Cardoso dos Santos and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  L{\'{e}}o Perrin and
                  Aleksei Udovenko and
                  Vesselin Velichkov and
                  Qingju Wang},
  title        = {Lightweight {AEAD} and Hashing using the Sparkle Permutation Family},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {208--261},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.208-261},
  doi          = {10.13154/TOSC.V2020.IS1.208-261},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BeierleBSGPUVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeierleJKLMPSSS20,
  author       = {Christof Beierle and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Amir Moradi and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Pascal Sasdrich and
                  Siang Meng Sim},
  title        = {{SKINNY-AEAD} and SKINNY-Hash},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {88--131},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.88-131},
  doi          = {10.13154/TOSC.V2020.IS1.88-131},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BeierleJKLMPSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BelliziaBBCDGLL20,
  author       = {Davide Bellizia and
                  Francesco Berti and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  S{\'{e}}bastien Duval and
                  Chun Guo and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Itamar Levi and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi and
                  Friedrich Wiemer},
  title        = {Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with
                  a Masked Tweakable Block Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {295--349},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.295-349},
  doi          = {10.13154/TOSC.V2020.IS1.295-349},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BelliziaBBCDGLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeullensBUV20,
  author       = {Ward Beullens and
                  Tim Beyne and
                  Aleksei Udovenko and
                  Giuseppe Vitto},
  title        = {Cryptanalysis of the Legendre {PRF} and Generalizations},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {313--330},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.313-330},
  doi          = {10.13154/TOSC.V2020.I1.313-330},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BeullensBUV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeyneCDM20,
  author       = {Tim Beyne and
                  Yu Long Chen and
                  Christoph Dobraunig and
                  Bart Mennink},
  title        = {Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for
                  the Lightweight Circus},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {5--30},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.5-30},
  doi          = {10.13154/TOSC.V2020.IS1.5-30},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BeyneCDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BilginMDLS20,
  author       = {Beg{\"{u}}l Bilgin and
                  Lauren De Meyer and
                  S{\'{e}}bastien Duval and
                  Itamar Levi and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Low {AND} Depth and Efficient Inverses: a Guide on S-boxes for Low-latency
                  Masking},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {144--184},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.144-184},
  doi          = {10.13154/TOSC.V2020.I1.144-184},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BilginMDLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouillaguetMS20,
  author       = {Charles Bouillaguet and
                  Florette Martinez and
                  Julia Sauvage},
  title        = {Practical seed-recovery for the {PCG} Pseudo-Random Number Generator},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {175--196},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.175-196},
  doi          = {10.13154/TOSC.V2020.I3.175-196},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BouillaguetMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BoukerrouHLMM20,
  author       = {Hamid Boukerrou and
                  Paul Huynh and
                  Virginie Lallemand and
                  Bimal Mandal and
                  Marine Minier},
  title        = {On the Feistel Counterpart of the Boomerang Connectivity Table Introduction
                  and Analysis of the {FBCT}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {331--362},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.331-362},
  doi          = {10.13154/TOSC.V2020.I1.331-362},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BoukerrouHLMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraC20,
  author       = {Christina Boura and
                  Daniel Coggia},
  title        = {Efficient {MILP} Modelings for Sboxes and Linear Layers of {SPN} ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {327--361},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.327-361},
  doi          = {10.13154/TOSC.V2020.I3.327-361},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CanteautDLNPPS20,
  author       = {Anne Canteaut and
                  S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Thomas Pornin and
                  Andr{\'{e}} Schrottenloher},
  title        = {Saturnin: a suite of lightweight symmetric algorithms for post-quantum
                  security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {160--207},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.160-207},
  doi          = {10.13154/TOSC.V2020.IS1.160-207},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CanteautDLNPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortiDJMN20,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Ashwin Jha and
                  Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Mridul Nandi and
                  Yu Sasaki},
  title        = {{ESTATE:} {A} Lightweight and Low Energy Authenticated Encryption
                  Mode},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {350--389},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.350-389},
  doi          = {10.13154/TOSC.V2020.IS1.350-389},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortiDJMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortiDJMN20a,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Ashwin Jha and
                  Snehal Mitragotri and
                  Mridul Nandi},
  title        = {From Combined to Hybrid: Making Feedback-based {AE} even Smaller},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {417--445},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.417-445},
  doi          = {10.13154/TOSC.V2020.IS1.417-445},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortiDJMN20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortiNTY20,
  author       = {Avik Chakraborti and
                  Mridul Nandi and
                  Suprita Talnikar and
                  Kan Yasuda},
  title        = {On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving
                  {BBB} Security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {2},
  pages        = {1--39},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i2.1-39},
  doi          = {10.13154/TOSC.V2020.I2.1-39},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortiNTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortyJN20,
  author       = {Bishwajit Chakraborty and
                  Ashwin Jha and
                  Mridul Nandi},
  title        = {On the Security of Sponge-type Authenticated Encryption Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {2},
  pages        = {93--119},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i2.93-119},
  doi          = {10.13154/TOSC.V2020.I2.93-119},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortyJN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChoiILLLMN20,
  author       = {Wonseok Choi and
                  Akiko Inoue and
                  ByeongHak Lee and
                  Jooyoung Lee and
                  Eik List and
                  Kazuhiko Minematsu and
                  Yusuke Naito},
  title        = {Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {39--70},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.39-70},
  doi          = {10.46586/TOSC.V2020.I4.39-70},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChoiILLLMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenHPAK20,
  author       = {Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Xoodyak, a lightweight cryptographic scheme},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {60--87},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.60-87},
  doi          = {10.13154/TOSC.V2020.IS1.60-87},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenHPAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenMMR20,
  author       = {Joan Daemen and
                  Pedro Maat Costa Massolino and
                  Alireza Mehrdad and
                  Yann Rotella},
  title        = {The Subterranean 2.0 Cipher Suite},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {262--294},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.262-294},
  doi          = {10.13154/TOSC.V2020.IS1.262-294},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenMMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DelauneDV20,
  author       = {St{\'{e}}phanie Delaune and
                  Patrick Derbez and
                  Mathieu Vavrille},
  title        = {Catching the Fastest Boomerangs Application to {SKINNY}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {104--129},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.104-129},
  doi          = {10.46586/TOSC.V2020.I4.104-129},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DelauneDV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezF20,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque},
  title        = {Increasing Precision of Division Property},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {173--194},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.173-194},
  doi          = {10.46586/TOSC.V2020.I4.173-194},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezFM20,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  Victor Mollimard},
  title        = {Fake Near Collisions Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {88--103},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.88-103},
  doi          = {10.46586/TOSC.V2020.I4.88-103},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezFM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DinurL20,
  author       = {Itai Dinur and
                  Ga{\"{e}}tan Leurent},
  title        = {Preface to Volume 2020, Special Issue on Designs for the {NIST} Lightweight
                  Standardisation Process},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {1--4},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.1-4},
  doi          = {10.13154/TOSC.V2020.IS1.1-4},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DinurL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMMPU20,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Bart Mennink and
                  Robert Primas and
                  Thomas Unterluggauer},
  title        = {Isap v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {390--416},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.390-416},
  doi          = {10.13154/TOSC.V2020.IS1.390-416},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMMPU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigM20,
  author       = {Christoph Dobraunig and
                  Bart Mennink},
  title        = {Tightness of the Suffix Keyed Sponge Bound},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {195--212},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.195-212},
  doi          = {10.46586/TOSC.V2020.I4.195-212},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigRS20,
  author       = {Christoph Dobraunig and
                  Yann Rotella and
                  Jan Schoone},
  title        = {Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {289--312},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.289-312},
  doi          = {10.13154/TOSC.V2020.I1.289-312},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GaoGWWW20,
  author       = {Yuan Gao and
                  Chun Guo and
                  Meiqin Wang and
                  Weijia Wang and
                  Jiejing Wen},
  title        = {Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation
                  Networks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {305--326},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.305-326},
  doi          = {10.13154/TOSC.V2020.I3.305-326},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GaoGWWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GoudarziJKPRSS20,
  author       = {Dahmun Goudarzi and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Thomas Peyrin and
                  Matthieu Rivain and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient
                  Masked Implementation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {31--59},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.31-59},
  doi          = {10.13154/TOSC.V2020.IS1.31-59},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GoudarziJKPRSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GunsingDM20,
  author       = {Aldo Gunsing and
                  Joan Daemen and
                  Bart Mennink},
  title        = {Errata to Sound Hashing Modes of Arbitrary Functions, Permutations,
                  and Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {362--366},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.362-366},
  doi          = {10.13154/TOSC.V2020.I3.362-366},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GunsingDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoPPS20,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Low-Energy Leakage-Resistant Authenticated Encryption from
                  the Duplex Sponge Construction},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {6--42},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.6-42},
  doi          = {10.13154/TOSC.V2020.I1.6-42},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoSSSSHW20,
  author       = {Hao Guo and
                  Siwei Sun and
                  Danping Shi and
                  Ling Sun and
                  Yao Sun and
                  Lei Hu and
                  Meiqin Wang},
  title        = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes
                  and Tweak Additions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {119--151},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.119-151},
  doi          = {10.13154/TOSC.V2020.I3.119-151},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoSSSSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HaoJLMTW20,
  author       = {Yonglin Hao and
                  Lin Jiao and
                  Chaoyun Li and
                  Willi Meier and
                  Yosuke Todo and
                  Qingju Wang},
  title        = {Links between Division Property and Other Cube Attack Variants},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {363--395},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.363-395},
  doi          = {10.13154/TOSC.V2020.I1.363-395},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HaoJLMTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HebbornL20,
  author       = {Phil Hebborn and
                  Gregor Leander},
  title        = {Dasta - Alternative Linear Layer for Rasta},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {46--86},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.46-86},
  doi          = {10.13154/TOSC.V2020.I3.46-86},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HebbornL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HeilmanNTLCVD20,
  author       = {Ethan Heilman and
                  Neha Narula and
                  Garrett Tanzer and
                  James Lovejoy and
                  Michael Colavita and
                  Madars Virza and
                  Tadge Dryja},
  title        = {Cryptanalysis of Curl-P and Other Attacks on the {IOTA} Cryptocurrency},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {367--391},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.367-391},
  doi          = {10.13154/TOSC.V2020.I3.367-391},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HeilmanNTLCVD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HosoyamadaNS20,
  author       = {Akinori Hosoyamada and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yu Sasaki},
  title        = {Improved Attacks on sLiSCP Permutation and Tight Bound of Limited
                  Birthday Distinguishers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {147--172},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.147-172},
  doi          = {10.46586/TOSC.V2020.I4.147-172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HosoyamadaNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuWW20,
  author       = {Kai Hu and
                  Qingju Wang and
                  Meiqin Wang},
  title        = {Finding Bit-Based Division Property for Ciphers with Complex Linear
                  Layers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {396--424},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.396-424},
  doi          = {10.13154/TOSC.V2020.I1.396-424},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HuWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/IwataKMP20,
  author       = {Tetsu Iwata and
                  Mustafa Khairallah and
                  Kazuhiko Minematsu and
                  Thomas Peyrin},
  title        = {Duel of the Titans: The Romulus and Remus Families of Lightweight
                  {AEAD} Algorithms},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {43--120},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.43-120},
  doi          = {10.13154/TOSC.V2020.I1.43-120},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/IwataKMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KimLL20,
  author       = {Hwigyeom Kim and
                  Yeongmin Lee and
                  Jooyoung Lee},
  title        = {Forking Tweakable Even-Mansour Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {71--87},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.71-87},
  doi          = {10.46586/TOSC.V2020.I4.71-87},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/KimLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeurentS20,
  author       = {Ga{\"{e}}tan Leurent and
                  Yu Sasaki},
  title        = {Preface to Volume 2020, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {1--5},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.1-5},
  doi          = {10.13154/TOSC.V2020.I1.1-5},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LeurentS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Minematsu20,
  author       = {Kazuhiko Minematsu},
  title        = {Fast Decryption: a New Feature of Misuse-Resistant {AE}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {87--118},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.87-118},
  doi          = {10.13154/TOSC.V2020.I3.87-118},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Minematsu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NaitoSS20,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara},
  title        = {{LM-DAE:} Low-Memory Deterministic Authenticated Encryption for 128-bit
                  Security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {1--38},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.1-38},
  doi          = {10.46586/TOSC.V2020.I4.1-38},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/NaitoSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NakamichiI20,
  author       = {Ryota Nakamichi and
                  Tetsu Iwata},
  title        = {Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal
                  Ciphers with Long Keys},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {2},
  pages        = {68--92},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i2.68-92},
  doi          = {10.13154/TOSC.V2020.I2.68-92},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/NakamichiI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/PijnenburgP20,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  title        = {Key Assignment Schemes with Authenticated Encryption, revisited},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {2},
  pages        = {40--67},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i2.40-67},
  doi          = {10.13154/TOSC.V2020.I2.40-67},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/PijnenburgP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/PoetteringR20,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler},
  title        = {Combiners for {AEAD}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {121--143},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.121-143},
  doi          = {10.13154/TOSC.V2020.I1.121-143},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/PoetteringR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SahaSSSSZ20,
  author       = {Dhiman Saha and
                  Yu Sasaki and
                  Danping Shi and
                  Ferdinand Sibleyras and
                  Siwei Sun and
                  Yingjie Zhang},
  title        = {On the Security Margin of TinyJAMBU with Refined Differential and
                  Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {152--174},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.152-174},
  doi          = {10.13154/TOSC.V2020.I3.152-174},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SahaSSSSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ShenGW20,
  author       = {Yaobin Shen and
                  Chun Guo and
                  Lei Wang},
  title        = {Improved Security Bounds for Generalized Feistel Networks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {425--457},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.425-457},
  doi          = {10.13154/TOSC.V2020.I1.425-457},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ShenGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunGWW20,
  author       = {Ling Sun and
                  David G{\'{e}}rault and
                  Wei Wang and
                  Meiqin Wang},
  title        = {On the Usage of Deterministic (Related-Key) Truncated Differentials
                  and Multidimensional Linear Approximations for {SPN} Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {262--287},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.262-287},
  doi          = {10.13154/TOSC.V2020.I3.262-287},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunGWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WangHGZS20,
  author       = {Senpeng Wang and
                  Bin Hu and
                  Jie Guan and
                  Kai Zhang and
                  Tairong Shi},
  title        = {Exploring Secret Keys in Searching Integral Distinguishers Based on
                  Division Property},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {288--304},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.288-304},
  doi          = {10.13154/TOSC.V2020.I3.288-304},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/WangHGZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/XiangZLBZ20,
  author       = {Zejun Xiang and
                  Xiangyong Zeng and
                  Da Lin and
                  Zhenzhen Bao and
                  Shasha Zhang},
  title        = {Optimizing Implementations of Linear Layers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {2},
  pages        = {120--145},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i2.120-145},
  doi          = {10.13154/TOSC.V2020.I2.120-145},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/XiangZLBZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YangJM20,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Spectral analysis of {ZUC-256}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {266--288},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.266-288},
  doi          = {10.13154/TOSC.V2020.I1.266-288},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YangJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AlbrechtHP19,
  author       = {Martin R. Albrecht and
                  Torben Brandt Hansen and
                  Kenneth G. Paterson},
  title        = {libInterMAC: Beyond Confidentiality and Integrity in Practice},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {46--83},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.46-83},
  doi          = {10.13154/TOSC.V2019.I1.46-83},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AlbrechtHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AnkeleDGLLT19,
  author       = {Ralph Ankele and
                  Christoph Dobraunig and
                  Jian Guo and
                  Eran Lambooij and
                  Gregor Leander and
                  Yosuke Todo},
  title        = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey
                  Expansion},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {192--235},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.192-235},
  doi          = {10.13154/TOSC.V2019.I1.192-235},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AnkeleDGLLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ArmourP19,
  author       = {Marcel Armour and
                  Bertram Poettering},
  title        = {Substitution Attacks against Message Authentication},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {152--168},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.152-168},
  doi          = {10.13154/TOSC.V2019.I3.152-168},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ArmourP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikBI19,
  author       = {Subhadeep Banik and
                  Khashayar Barooti and
                  Takanori Isobe},
  title        = {Cryptanalysis of Plantlet},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {103--120},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.103-120},
  doi          = {10.13154/TOSC.V2019.I3.103-120},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikBI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoDGWZ19,
  author       = {Zhenzhen Bao and
                  Lin Ding and
                  Jian Guo and
                  Haoyang Wang and
                  Wenying Zhang},
  title        = {Improved Meet-in-the-Middle Preimage Attacks against {AES} Hashing
                  Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {318--347},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.318-347},
  doi          = {10.13154/TOSC.V2019.I4.318-347},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoDGWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGIM19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption
                  with Full Absorption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {1--54},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.1-54},
  doi          = {10.13154/TOSC.V2019.I2.1-54},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGIM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGLS19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  San Ling and
                  Yu Sasaki},
  title        = {{PEIGEN} - a Platform for Evaluation, Implementation, and Generation
                  of S-boxes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {330--394},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.330-394},
  doi          = {10.13154/TOSC.V2019.I1.330-394},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeierleLMR19,
  author       = {Christof Beierle and
                  Gregor Leander and
                  Amir Moradi and
                  Shahram Rasoolzadeh},
  title        = {{CRAFT:} Lightweight Tweakable Block Cipher with Efficient Protection
                  Against {DFA} Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {5--45},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.5-45},
  doi          = {10.13154/TOSC.V2019.I1.5-45},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BeierleLMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BonnetainNS19,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Security Analysis of {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {55--93},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.55-93},
  doi          = {10.13154/TOSC.V2019.I2.55-93},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BonnetainNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraCC19,
  author       = {Christina Boura and
                  Anne Canteaut and
                  Daniel Coggia},
  title        = {A General Proof Framework for Recent {AES} Distinguishers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {170--191},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.170-191},
  doi          = {10.13154/TOSC.V2019.I1.170-191},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CauchoisGT19,
  author       = {Victor Cauchois and
                  Cl{\'{e}}ment Gomez and
                  Ga{\"{e}}l Thomas},
  title        = {General Diffusion Analysis: How to Find Optimal Permutations for Generalized
                  Type-II Feistel Schemes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {264--301},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.264-301},
  doi          = {10.13154/TOSC.V2019.I1.264-301},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CauchoisGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortiDJMN19,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Ashwin Jha and
                  Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Mridul Nandi and
                  Yu Sasaki},
  title        = {{INT-RUP} Secure Lightweight Parallel {AE} Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {81--118},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.81-118},
  doi          = {10.13154/TOSC.V2019.I4.81-118},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortiDJMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChangDDMNSS19,
  author       = {Donghoon Chang and
                  Nilanjan Datta and
                  Avijit Dutta and
                  Bart Mennink and
                  Mridul Nandi and
                  Somitra Sanadhya and
                  Ferdinand Sibleyras},
  title        = {Release of Unverified Plaintext: Tight Unified Model and Application
                  to {ANYDAE}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {119--146},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.119-146},
  doi          = {10.13154/TOSC.V2019.I4.119-146},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChangDDMNSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ConnollyFF19,
  author       = {Aisling Connolly and
                  Pooya Farshim and
                  Georg Fuchsbauer},
  title        = {Security of Symmetric Primitives against Key-Correlated Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {193--230},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.193-230},
  doi          = {10.13154/TOSC.V2019.I3.193-230},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ConnollyFF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezFLM19,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  Baptiste Lambin and
                  Victor Mollimard},
  title        = {Efficient Search for Optimal Diffusion Layers of Generalized Feistel
                  Networks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {218--240},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.218-240},
  doi          = {10.13154/TOSC.V2019.I2.218-240},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezFLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigM19,
  author       = {Christoph Dobraunig and
                  Bart Mennink},
  title        = {Security of the Suffix Keyed Sponge},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {223--248},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.223-248},
  doi          = {10.13154/TOSC.V2019.I4.223-248},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DunkelmanH19,
  author       = {Orr Dunkelman and
                  Senyang Huang},
  title        = {Reconstructing an S-box from its Difference Distribution Table},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {193--217},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.193-217},
  doi          = {10.13154/TOSC.V2019.I2.193-217},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DunkelmanH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/EichlsederNP19,
  author       = {Maria Eichlseder and
                  Marcel Nageler and
                  Robert Primas},
  title        = {Analyzing the Linear Keystream Biases in {AEGIS}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {348--368},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.348-368},
  doi          = {10.13154/TOSC.V2019.I4.348-368},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/EichlsederNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Ekdahl0MY19,
  author       = {Patrik Ekdahl and
                  Thomas Johansson and
                  Alexander Maximov and
                  Jing Yang},
  title        = {A new {SNOW} stream cipher called {SNOW-V}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {1--42},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.1-42},
  doi          = {10.13154/TOSC.V2019.I3.1-42},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Ekdahl0MY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GrochowLN19,
  author       = {Tony Grochow and
                  Eik List and
                  Mridul Nandi},
  title        = {DoveMAC: {A} TBC-based {PRF} with Smaller State, Full Security, and
                  High Rate},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {43--80},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.43-80},
  doi          = {10.13154/TOSC.V2019.I3.43-80},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GrochowLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GunsingDM19,
  author       = {Aldo Gunsing and
                  Joan Daemen and
                  Bart Mennink},
  title        = {Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded
                  Keyed Hashing Model},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {1--22},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.1-22},
  doi          = {10.13154/TOSC.V2019.I4.1-22},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GunsingDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoSWY19,
  author       = {Chun Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Weijia Wang and
                  Yu Yu},
  title        = {Efficient Side-Channel Secure Message Authentication with Better Bounds},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {23--53},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.23-53},
  doi          = {10.13154/TOSC.V2019.I4.23-53},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoSWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HadipourSNSB19,
  author       = {Hosein Hadipour and
                  Sadegh Sadeghi and
                  Majid M. Niknam and
                  Ling Song and
                  Nasour Bagheri},
  title        = {Comprehensive security analysis of {CRAFT}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {290--317},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.290-317},
  doi          = {10.13154/TOSC.V2019.I4.290-317},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HadipourSNSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Kesarwani0V19,
  author       = {Abhishek Kesarwani and
                  Santanu Sarkar and
                  Ayineedi Venkateswarlu},
  title        = {Exhaustive Search for Various Types of {MDS} Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {231--256},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.231-256},
  doi          = {10.13154/TOSC.V2019.I3.231-256},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Kesarwani0V19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Khairallah19,
  author       = {Mustafa Khairallah},
  title        = {Weak Keys in the Rekeying Paradigm: Application to {COMET} and mixFeed},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {272--289},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.272-289},
  doi          = {10.13154/TOSC.V2019.I4.272-289},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Khairallah19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeeK19,
  author       = {Jung{-}Keun Lee and
                  Woo{-}Hwan Kim},
  title        = {Multiple Linear Cryptanalysis Using Linear Statistics},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {369--406},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.369-406},
  doi          = {10.13154/TOSC.V2019.I4.369-406},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LeeK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiDBJWM19,
  author       = {Zheng Li and
                  Xiaoyang Dong and
                  Wenquan Bi and
                  Keting Jia and
                  Xiaoyun Wang and
                  Willi Meier},
  title        = {New Conditional Cube Attack on Keccak Keyed Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {94--124},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.94-124},
  doi          = {10.13154/TOSC.V2019.I2.94-124},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiDBJWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiHW19,
  author       = {Muzhou Li and
                  Kai Hu and
                  Meiqin Wang},
  title        = {Related-Tweak Statistical Saturation Cryptanalysis and Its Application
                  on {QARMA}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {236--263},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.236-263},
  doi          = {10.13154/TOSC.V2019.I1.236-263},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiSLWH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Chaoyun Li and
                  Zihao Wei and
                  Lei Hu},
  title        = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight
                  Circuits},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {84--117},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.84-117},
  doi          = {10.13154/TOSC.V2019.I1.84-117},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiSLWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiSSLH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Danping Shi and
                  Chaoyun Li and
                  Lei Hu},
  title        = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {147--170},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.147-170},
  doi          = {10.13154/TOSC.V2019.I4.147-170},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  title        = {New Semi-Free-Start Collision Attack Framework for Reduced {RIPEMD-160}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {169--192},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.169-192},
  doi          = {10.13154/TOSC.V2019.I3.169-192},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuIM19,
  author       = {Fukang Liu and
                  Takanori Isobe and
                  Willi Meier},
  title        = {Cube-Based Cryptanalysis of Subterranean-SAE},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {192--222},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.192-222},
  doi          = {10.13154/TOSC.V2019.I4.192-222},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuIM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuQT19,
  author       = {Guozhen Liu and
                  Weidong Qiu and
                  Yi Tu},
  title        = {New Techniques for Searching Differential Trails in Keccak},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {407--437},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.407-437},
  doi          = {10.13154/TOSC.V2019.I4.407-437},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuQT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MendelS19,
  author       = {Florian Mendel and
                  Yu Sasaki},
  title        = {Preface to Volume 2019, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {1--4},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.1-4},
  doi          = {10.13154/TOSC.V2019.I1.1-4},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MendelS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MeyerB19,
  author       = {Lauren De Meyer and
                  Beg{\"{u}}l Bilgin},
  title        = {Classification of Balanced Quadratic Functions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {169--192},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.169-192},
  doi          = {10.13154/TOSC.V2019.I2.169-192},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MeyerB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Naito19,
  author       = {Yusuke Naito},
  title        = {The Exact Security of {PMAC} with Two Powering-Up Masks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {125--145},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.125-145},
  doi          = {10.13154/TOSC.V2019.I2.125-145},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Naito19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/NakamichiI19,
  author       = {Ryota Nakamichi and
                  Tetsu Iwata},
  title        = {Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {54--80},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.54-80},
  doi          = {10.13154/TOSC.V2019.I4.54-80},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/NakamichiI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Perrin19,
  author       = {L{\'{e}}o Perrin},
  title        = {Partitions in the S-Box of Streebog and Kuznyechik},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {302--329},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.302-329},
  doi          = {10.13154/TOSC.V2019.I1.302-329},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Perrin19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ShenW19,
  author       = {Yaobin Shen and
                  Lei Wang},
  title        = {On Beyond-Birthday-Bound Security: Revisiting the Development of {ISO/IEC}
                  9797-1 MACs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {146--168},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.146-168},
  doi          = {10.13154/TOSC.V2019.I2.146-168},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ShenW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SongQH19,
  author       = {Ling Song and
                  Xianrui Qin and
                  Lei Hu},
  title        = {Boomerang Connectivity Table Revisited. Application to {SKINNY} and
                  {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {118--141},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.118-141},
  doi          = {10.13154/TOSC.V2019.I1.118-141},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SongQH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WangP19,
  author       = {Haoyang Wang and
                  Thomas Peyrin},
  title        = {Boomerang Switch in Multiple Rounds. Application to {AES} Variants
                  and Deoxys},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {142--169},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.142-169},
  doi          = {10.13154/TOSC.V2019.I1.142-169},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/WangP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YangJM19,
  author       = {Jing Yang and
                  Thomas Johansson and
                  Alexander Maximov},
  title        = {Vectorized linear approximations for attacks on {SNOW} 3G},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {249--271},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.249-271},
  doi          = {10.13154/TOSC.V2019.I4.249-271},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YangJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YeT19,
  author       = {Chen{-}Dong Ye and
                  Tian Tian},
  title        = {Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing
                  Attacks?},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {81--102},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.81-102},
  doi          = {10.13154/TOSC.V2019.I3.81-102},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YeT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangCGP19,
  author       = {Wenying Zhang and
                  Meichun Cao and
                  Jian Guo and
                  Enes Pasalic},
  title        = {Improved Security Evaluation of {SPN} Block Ciphers and its Applications
                  in the Single-key Attack on {SKINNY}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {171--191},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.171-191},
  doi          = {10.13154/TOSC.V2019.I4.171-191},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangCGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhaoDJ19,
  author       = {Boxin Zhao and
                  Xiaoyang Dong and
                  Keting Jia},
  title        = {New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including
                  {BDT} Effect},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {121--151},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.121-151},
  doi          = {10.13154/TOSC.V2019.I3.121-151},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhaoDJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhouZDX19,
  author       = {Chunning Zhou and
                  Wentao Zhang and
                  Tianyou Ding and
                  Zejun Xiang},
  title        = {Improving the MILP-based Security Evaluation Algorithm against Differential/Linear
                  Cryptanalysis Using {A} Divide-and-Conquer Approach},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {438--469},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.438-469},
  doi          = {10.13154/TOSC.V2019.I4.438-469},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhouZDX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001018,
  author       = {Ling Song and
                  Jian Guo},
  title        = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using {MILP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {182--214},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.182-214},
  doi          = {10.13154/TOSC.V2018.I3.182-214},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AlfaranoBIKL18,
  author       = {Gianira N. Alfarano and
                  Christof Beierle and
                  Takanori Isobe and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander},
  title        = {ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations
                  for Midori and Skinny},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {20--47},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.20-47},
  doi          = {10.13154/TOSC.V2018.I2.20-47},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/AlfaranoBIKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikBLT18,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Elmar Tischhauser},
  title        = {{SUNDAE:} Small Universal Deterministic Authenticated Encryption for
                  the Internet of Things},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {1--35},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.1-35},
  doi          = {10.13154/TOSC.V2018.I3.1-35},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikBLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikMAIMBWR18,
  author       = {Subhadeep Banik and
                  Vasily Mikhalev and
                  Frederik Armknecht and
                  Takanori Isobe and
                  Willi Meier and
                  Andrey Bogdanov and
                  Yuhei Watanabe and
                  Francesco Regazzoni},
  title        = {Towards Low Energy Stream Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.1-19},
  doi          = {10.13154/TOSC.V2018.I2.1-19},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikMAIMBWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGW18,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Lei Wang},
  title        = {Functional Graphs and Their Applications in Generic Attacks on Iterated
                  Hash Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {201--253},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.201-253},
  doi          = {10.13154/TOSC.V2018.I1.201-253},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeierleCL18,
  author       = {Christof Beierle and
                  Anne Canteaut and
                  Gregor Leander},
  title        = {Nonlinear Approximations in Cryptanalysis Revisited},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {80--101},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.80-101},
  doi          = {10.13154/TOSC.V2018.I4.80-101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BeierleCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BhattacharyaN18,
  author       = {Srimanta Bhattacharya and
                  Mridul Nandi},
  title        = {Revisiting Variable Output Length {XOR} Pseudorandom Function},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {314--335},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.314-335},
  doi          = {10.13154/TOSC.V2018.I1.314-335},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BhattacharyaN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BihamP18,
  author       = {Eli Biham and
                  Stav Perle},
  title        = {Conditional Linear Cryptanalysis - Cryptanalysis of {DES} with Less
                  Than 242 Complexity},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {215--264},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.215-264},
  doi          = {10.13154/TOSC.V2018.I3.215-264},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BihamP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BogdanovTV18,
  author       = {Andrey Bogdanov and
                  Elmar Tischhauser and
                  Philip S. Vejre},
  title        = {Multivariate Profiling of Hulls for Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {101--125},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.101-125},
  doi          = {10.13154/TOSC.V2018.I1.101-125},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BogdanovTV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouillaguetDF18,
  author       = {Charles Bouillaguet and
                  Claire Delaplace and
                  Pierre{-}Alain Fouque},
  title        = {Revisiting and Improving Algorithms for the 3XOR Problem},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {254--276},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.254-276},
  doi          = {10.13154/TOSC.V2018.I1.254-276},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouillaguetDF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraC18,
  author       = {Christina Boura and
                  Anne Canteaut},
  title        = {On the Boomerang Uniformity of Cryptographic Sboxes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {290--310},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.290-310},
  doi          = {10.13154/TOSC.V2018.I3.290-310},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGGJRS18,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Ling Song},
  title        = {Key-Recovery Attacks on Full Kravatte},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {5--28},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.5-28},
  doi          = {10.13154/TOSC.V2018.I1.5-28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CrowleyB18,
  author       = {Paul Crowley and
                  Eric Biggers},
  title        = {Adiantum: length-preserving encryption for entry-level processors},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {39--61},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.39-61},
  doi          = {10.13154/TOSC.V2018.I4.39-61},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CrowleyB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenHAK18,
  author       = {Joan Daemen and
                  Seth Hoffert and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {The design of Xoodoo and Xoofff},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {1--38},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.1-38},
  doi          = {10.13154/TOSC.V2018.I4.1-38},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenHAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenMA18,
  author       = {Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  title        = {Sound Hashing Modes of Arbitrary Functions, Permutations, and Block
                  Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {197--228},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.197-228},
  doi          = {10.13154/TOSC.V2018.I4.197-228},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaDN018,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Goutam Paul},
  title        = {Double-block Hash-then-Sum: {A} Paradigm for Constructing {BBB} Secure
                  {PRF}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {36--92},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.36-92},
  doi          = {10.13154/TOSC.V2018.I3.36-92},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DattaDN018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DerbezISSTWW18,
  author       = {Patrick Derbez and
                  Tetsu Iwata and
                  Ling Sun and
                  Siwei Sun and
                  Yosuke Todo and
                  Haoyang Wang and
                  Meiqin Wang},
  title        = {Cryptanalysis of {AES-PRF} and Its Dual},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {161--191},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.161-191},
  doi          = {10.13154/TOSC.V2018.I2.161-191},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DerbezISSTWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DuvalL18,
  author       = {S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  title        = {{MDS} Matrices with Lightweight Circuits},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {48--78},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.48-78},
  doi          = {10.13154/TOSC.V2018.I2.48-78},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DuvalL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/EichlsederK18,
  author       = {Maria Eichlseder and
                  Daniel Kales},
  title        = {Clustering Related-Tweak Characteristics: Application to {MANTIS-6}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {111--132},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.111-132},
  doi          = {10.13154/TOSC.V2018.I2.111-132},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/EichlsederK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FauskangerS18,
  author       = {Stian Fauskanger and
                  Igor A. Semaev},
  title        = {Separable Statistics and Multidimensional Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {79--110},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.79-110},
  doi          = {10.13154/TOSC.V2018.I2.79-110},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FauskangerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FehrKM18,
  author       = {Serge Fehr and
                  Pierre Karpman and
                  Bart Mennink},
  title        = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {336--352},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.336-352},
  doi          = {10.13154/TOSC.V2018.I1.336-352},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FehrKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FuhrNR18,
  author       = {Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Yann Rotella},
  title        = {State-Recovery Attacks on Modified Ketje Jr},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {29--56},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.29-56},
  doi          = {10.13154/TOSC.V2018.I1.29-56},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FuhrNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GhoshalSPDPM18,
  author       = {Ashrujit Ghoshal and
                  Rajat Sadhukhan and
                  Sikhar Patranabis and
                  Nilanjan Datta and
                  Stjepan Picek and
                  Debdeep Mukhopadhyay},
  title        = {Lightweight and Side-channel Secure 4 {\texttimes} 4 S-Boxes from
                  Cellular Automata Rules},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {311--334},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.311-334},
  doi          = {10.13154/TOSC.V2018.I3.311-334},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GhoshalSPDPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Grassi18,
  author       = {Lorenzo Grassi},
  title        = {Mixture Differential Cryptanalysis: a New Approach to Distinguishers
                  and Attacks on round-reduced {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {133--160},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.133-160},
  doi          = {10.13154/TOSC.V2018.I2.133-160},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Grassi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Hall-AndersenV18,
  author       = {Mathias Hall{-}Andersen and
                  Philip S. Vejre},
  title        = {Generating Graphs Packed with Paths Estimation of Linear Approximations
                  and Differentials},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {265--289},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.265-289},
  doi          = {10.13154/TOSC.V2018.I3.265-289},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Hall-AndersenV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuangW18,
  author       = {Tao Huang and
                  Hongjun Wu},
  title        = {Distinguishing Attack on {NORX} Permutation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {57--73},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.57-73},
  doi          = {10.13154/TOSC.V2018.I1.57-73},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HuangW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Key Assignment Scheme with Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {150--196},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.150-196},
  doi          = {10.13154/TOSC.V2018.I4.150-196},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LachariteP18,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Kenneth G. Paterson},
  title        = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically
                  encrypted data},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {277--313},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.277-313},
  doi          = {10.13154/TOSC.V2018.I1.277-313},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LachariteP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LeanderTW18,
  author       = {Gregor Leander and
                  Cihangir Tezcan and
                  Friedrich Wiemer},
  title        = {Searching for Subspace Trails and Truncated Differentials},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {74--100},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.74-100},
  doi          = {10.13154/TOSC.V2018.I1.74-100},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LeanderTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiTYW18,
  author       = {Yongqiang Li and
                  Shizhu Tian and
                  Yuyin Yu and
                  Mingsheng Wang},
  title        = {On the Generalization of Butterfly Structure},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {160--179},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.160-179},
  doi          = {10.13154/TOSC.V2018.I1.160-179},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiTYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MendelN18,
  author       = {Florian Mendel and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Preface to Volume 2018, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.1-4},
  doi          = {10.13154/TOSC.V2018.I1.1-4},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MendelN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Mennink18,
  author       = {Bart Mennink},
  title        = {Key Prediction Security of Keyed Sponges},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {128--149},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.128-149},
  doi          = {10.13154/TOSC.V2018.I4.128-149},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Mennink18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/RechbergerST18,
  author       = {Christian Rechberger and
                  Hadi Soleimany and
                  Tyge Tiessen},
  title        = {Cryptanalysis of Low-Data Instances of Full LowMCv2},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {163--181},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.163-181},
  doi          = {10.13154/TOSC.V2018.I3.163-181},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/RechbergerST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SadeghiMB18,
  author       = {Sadegh Sadeghi and
                  Tahereh Mohammadi and
                  Nasour Bagheri},
  title        = {Cryptanalysis of Reduced round {SKINNY} Block Cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {124--162},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.124-162},
  doi          = {10.13154/TOSC.V2018.I3.124-162},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SadeghiMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SahaR018,
  author       = {Dhiman Saha and
                  Mostafizar Rahman and
                  Goutam Paul},
  title        = {New Yoyo Tricks with AES-based Permutations},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {102--127},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.102-127},
  doi          = {10.13154/TOSC.V2018.I4.102-127},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SahaR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/StoffelenD18,
  author       = {Ko Stoffelen and
                  Joan Daemen},
  title        = {Column Parity Mixers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {126--159},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.126-159},
  doi          = {10.13154/TOSC.V2018.I1.126-159},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/StoffelenD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Sun0W18,
  author       = {Ling Sun and
                  Wei Wang and
                  Meiqin Wang},
  title        = {More Accurate Differential Properties of {LED64} and Midori64},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {93--123},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.93-123},
  doi          = {10.13154/TOSC.V2018.I3.93-123},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Sun0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WeiYWP18,
  author       = {Yongzhuang Wei and
                  Tao Ye and
                  Wenling Wu and
                  Enes Pasalic},
  title        = {Generalized Nonlinear Invariant Attack and a New Design Criterion
                  for Round Constants},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {62--79},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.62-79},
  doi          = {10.13154/TOSC.V2018.I4.62-79},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/WeiYWP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhouWS18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun},
  title        = {On Efficient Constructions of Lightweight {MDS} Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {180--200},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.180-200},
  doi          = {10.13154/TOSC.V2018.I1.180-200},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhouWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/000117,
  author       = {Yusuke Naito},
  title        = {Tweakable Blockciphers for Efficient Authenticated Encryptions with
                  Beyond the Birthday-Bound Security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {1--26},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.1-26},
  doi          = {10.13154/TOSC.V2017.I2.1-26},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/000117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001BBNPS17,
  author       = {Elena Andreeva and
                  Guy Barwell and
                  Ritam Bhaumik and
                  Mridul Nandi and
                  Dan Page and
                  Martijn Stam},
  title        = {Turning Online Ciphers Off},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {105--142},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.105-142},
  doi          = {10.13154/TOSC.V2017.I2.105-142},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/0001BBNPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001STTY17,
  author       = {Ahmed Abdelkhalek and
                  Yu Sasaki and
                  Yosuke Todo and
                  Mohamed Tolba and
                  Amr M. Youssef},
  title        = {{MILP} Modeling for (Large) S-boxes to Optimize Probability of Differential
                  Characteristics},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {99--129},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.99-129},
  doi          = {10.13154/TOSC.V2017.I4.99-129},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/0001STTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AshurBD17,
  author       = {Tomer Ashur and
                  Achiya Bar{-}On and
                  Orr Dunkelman},
  title        = {Cryptanalysis of {GOST2}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {203--214},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.203-214},
  doi          = {10.13154/TOSC.V2017.I1.203-214},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AshurBD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AtighehchiB17,
  author       = {Kevin Atighehchi and
                  Alexis Bonnecaze},
  title        = {Asymptotic Analysis of Plausible Tree Hash Modes for {SHA-3}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {212--239},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.212-239},
  doi          = {10.13154/TOSC.V2017.I4.212-239},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AtighehchiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Avanzi17,
  author       = {Roberto Avanzi},
  title        = {The {QARMA} Block Cipher Family. Almost {MDS} Matrices Over Rings
                  With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With
                  Non-Involutory Central Rounds, and Search Heuristics for Low-Latency
                  S-Boxes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {4--44},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.4-44},
  doi          = {10.13154/TOSC.V2017.I1.4-44},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Avanzi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikBIJ17,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Takanori Isobe and
                  Martin Bjerregaard Jepsen},
  title        = {Analysis of Software Countermeasures for Whitebox Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {307--328},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.307-328},
  doi          = {10.13154/TOSC.V2017.I1.307-328},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikBIJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikICG17,
  author       = {Subhadeep Banik and
                  Takanori Isobe and
                  Tingting Cui and
                  Jian Guo},
  title        = {Some cryptanalytic results on Lizard},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {82--98},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.82-98},
  doi          = {10.13154/TOSC.V2017.I4.82-98},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikICG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertiPPS17,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {On Leakage-Resilient Authenticated Encryption with Decryption Leakages},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {271--293},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.271-293},
  doi          = {10.13154/TOSC.V2017.I3.271-293},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BertiPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertoniDHPAK17,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Farfalle: parallel permutation-based cryptography},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {1--38},
  year         = {2017},
  url          = {https://tosc.iacr.org/index.php/ToSC/article/view/801},
  timestamp    = {Mon, 08 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BertoniDHPAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BhasinJP17,
  author       = {Shivam Bhasin and
                  Dirmanto Jap and
                  Thomas Peyrin},
  title        = {Practical Evaluation of {FSE} 2016 Customized Encoding Countermeasure},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {108--129},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.108-129},
  doi          = {10.13154/TOSC.V2017.I3.108-129},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BhasinJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Blondeau17,
  author       = {C{\'{e}}line Blondeau},
  title        = {Accurate Estimate of the Advantage of Impossible Differential Attacks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {169--191},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.169-191},
  doi          = {10.13154/TOSC.V2017.I3.169-191},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Blondeau17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BothM17,
  author       = {Leif Both and
                  Alexander May},
  title        = {The Approximate k-List Problem},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {380--397},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.380-397},
  doi          = {10.13154/TOSC.V2017.I1.380-397},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BothM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BozilovBS17,
  author       = {Dusan Bozilov and
                  Beg{\"{u}}l Bilgin and
                  Haci Ali Sahin},
  title        = {A Note on 5-bit Quadratic Permutations' Classification},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {398--404},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.398-404},
  doi          = {10.13154/TOSC.V2017.I1.398-404},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BozilovBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CanteautLNRSS17,
  author       = {Anne Canteaut and
                  Eran Lambooij and
                  Samuel Neves and
                  Shahram Rasoolzadeh and
                  Yu Sasaki and
                  Marc Stevens},
  title        = {Refined Probability of Differential Characteristics Including Dependency
                  Between Multiple Rounds},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {203--227},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.203-227},
  doi          = {10.13154/TOSC.V2017.I2.203-227},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CanteautLNRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CarletMR17,
  author       = {Claude Carlet and
                  Pierrick M{\'{e}}aux and
                  Yann Rotella},
  title        = {Boolean functions with restricted input and their robustness; application
                  to the {FLIP} cipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {192--227},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.192-227},
  doi          = {10.13154/TOSC.V2017.I3.192-227},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CarletMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CauchoisGL17,
  author       = {Victor Cauchois and
                  Cl{\'{e}}ment Gomez and
                  Reynald Lercier},
  title        = {Gr{\o}stl Distinguishing Attack: {A} New Rebound Attack of an AES-like
                  Permutation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {1--23},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.1-23},
  doi          = {10.13154/TOSC.V2017.I3.1-23},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CauchoisGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGJR17,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {156--174},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.156-174},
  doi          = {10.13154/TOSC.V2017.I1.156-174},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortyGS17,
  author       = {Debrup Chakraborty and
                  Sebati Ghosh and
                  Palash Sarkar},
  title        = {A Fast Single-Key Two-Level Universal Hash Function},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {106--128},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.106-128},
  doi          = {10.13154/TOSC.V2017.I1.106-128},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortyGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenLMP17,
  author       = {Yu Long Chen and
                  Atul Luykx and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Efficient Length Doubling From Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {253--270},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.253-270},
  doi          = {10.13154/TOSC.V2017.I3.253-270},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenLMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CidHPSS17,
  author       = {Carlos Cid and
                  Tao Huang and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Ling Song},
  title        = {A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {73--107},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.73-107},
  doi          = {10.13154/TOSC.V2017.I3.73-107},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/CidHPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CogliatiLS17,
  author       = {Beno{\^{\i}}t Cogliati and
                  Jooyoung Lee and
                  Yannick Seurin},
  title        = {New Constructions of MACs from (Tweakable) Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {27--58},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.27-58},
  doi          = {10.13154/TOSC.V2017.I2.27-58},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CogliatiLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaDN0Z17,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Goutam Paul and
                  Liting Zhang},
  title        = {Single Key Variant of PMAC{\_}Plus},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {268--305},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.268-305},
  doi          = {10.13154/TOSC.V2017.I4.268-305},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DattaDN0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaLMN17,
  author       = {Nilanjan Datta and
                  Atul Luykx and
                  Bart Mennink and
                  Mridul Nandi},
  title        = {Understanding {RUP} Integrity of {COLM}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {143--161},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.143-161},
  doi          = {10.13154/TOSC.V2017.I2.143-161},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DattaLMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEMMU17,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Towards Side-Channel Secure Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {80--105},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.80-105},
  doi          = {10.13154/TOSC.V2017.I1.80-105},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEMMU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DongLWQ17,
  author       = {Xiaoyang Dong and
                  Zheng Li and
                  Xiaoyun Wang and
                  Ling Qin},
  title        = {Cube-like Attack on Round-Reduced Initialization of Ketje Sr},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {259--280},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.259-280},
  doi          = {10.13154/TOSC.V2017.I1.259-280},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DongLWQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DuttaJN17,
  author       = {Avijit Dutta and
                  Ashwin Jha and
                  Mridul Nandi},
  title        = {Tight Security Analysis of EHtM {MAC}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {130--150},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.130-150},
  doi          = {10.13154/TOSC.V2017.I3.130-150},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DuttaJN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FarshimKV17,
  author       = {Pooya Farshim and
                  Louiza Khati and
                  Damien Vergnaud},
  title        = {Security of Even-Mansour Ciphers under Key-Dependent Messages},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {84--104},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.84-104},
  doi          = {10.13154/TOSC.V2017.I2.84-104},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FarshimKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FarshimOR17,
  author       = {Pooya Farshim and
                  Claudio Orlandi and
                  Razvan Rosie},
  title        = {Security of Symmetric Primitives under Incorrect Usage of Keys},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {449--473},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.449-473},
  doi          = {10.13154/TOSC.V2017.I1.449-473},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FarshimOR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/FuFW17,
  author       = {Shihui Fu and
                  Xiutao Feng and
                  Baofeng Wu},
  title        = {Differentially 4-Uniform Permutations with the Best Known Nonlinearity
                  from Butterflies},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {228--249},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.228-249},
  doi          = {10.13154/TOSC.V2017.I2.228-249},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/FuFW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoLGWL17,
  author       = {Zhiyuan Guo and
                  Renzhang Liu and
                  Si Gao and
                  Wenling Wu and
                  Dongdai Lin},
  title        = {Direct Construction of Optimal Rotational-XOR Diffusion Primitives},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {169--187},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.169-187},
  doi          = {10.13154/TOSC.V2017.I4.169-187},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoLGWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HamannKM17,
  author       = {Matthias Hamann and
                  Matthias Krause and
                  Willi Meier},
  title        = {{LIZARD} - {A} Lightweight Stream Cipher for Power-constrained Devices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {45--79},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.45-79},
  doi          = {10.13154/TOSC.V2017.I1.45-79},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HamannKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/IwataS17,
  author       = {Tetsu Iwata and
                  Yannick Seurin},
  title        = {Reconsidering the Security Bound of {AES-GCM-SIV}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {240--267},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.240-267},
  doi          = {10.13154/TOSC.V2017.I4.240-267},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/IwataS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/JeanPST17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Siang Meng Sim and
                  Jade Tourteaux},
  title        = {Optimizing Implementations of Lightweight Building Blocks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {130--168},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.130-168},
  doi          = {10.13154/TOSC.V2017.I4.130-168},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/JeanPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/JhaMN17,
  author       = {Ashwin Jha and
                  Avradip Mandal and
                  Mridul Nandi},
  title        = {On The Exact Security of Message Authentication Using Pseudorandom
                  Functions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {427--448},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.427-448},
  doi          = {10.13154/TOSC.V2017.I1.427-448},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/JhaMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KhooLPS17,
  author       = {Khoongming Khoo and
                  Eugene Lee and
                  Thomas Peyrin and
                  Siang Meng Sim},
  title        = {Human-readable Proof of the Related-Key Security of {AES-128}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {59--83},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.59-83},
  doi          = {10.13154/TOSC.V2017.I2.59-83},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KhooLPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KranzLSW17,
  author       = {Thorsten Kranz and
                  Gregor Leander and
                  Ko Stoffelen and
                  Friedrich Wiemer},
  title        = {Shorter Linear Straight-Line Programs for {MDS} Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {188--211},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.188-211},
  doi          = {10.13154/TOSC.V2017.I4.188-211},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KranzLSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KranzLW17,
  author       = {Thorsten Kranz and
                  Gregor Leander and
                  Friedrich Wiemer},
  title        = {Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {474--505},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.474-505},
  doi          = {10.13154/TOSC.V2017.I1.474-505},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KranzLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiDW17,
  author       = {Zheng Li and
                  Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Conditional Cube Attack on Round-Reduced {ASCON}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {175--202},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.175-202},
  doi          = {10.13154/TOSC.V2017.I1.175-202},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiSLW17,
  author       = {Ting Li and
                  Yao Sun and
                  Maodong Liao and
                  Dingkang Wang},
  title        = {Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {39--57},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.39-57},
  doi          = {10.13154/TOSC.V2017.I4.39-57},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiSLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiW17,
  author       = {Chaoyun Li and
                  Qingju Wang},
  title        = {Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {129--155},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.129-155},
  doi          = {10.13154/TOSC.V2017.I1.129-155},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LinW17,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Meet-in-the-Middle Attacks on Reduced-Round Midori64},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {215--239},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.215-239},
  doi          = {10.13154/TOSC.V2017.I1.215-239},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LinW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ListN17,
  author       = {Eik List and
                  Mridul Nandi},
  title        = {{ZMAC+} - An Efficient Variable-output-length Variant of {ZMAC}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {306--325},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.306-325},
  doi          = {10.13154/TOSC.V2017.I4.306-325},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ListN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuGL17,
  author       = {Guozhen Liu and
                  Mohona Ghosh and
                  Ling Song},
  title        = {Security Analysis of {SKINNY} under Related-Tweakey Settings (Long
                  Paper)},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {37--72},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.37-72},
  doi          = {10.13154/TOSC.V2017.I3.37-72},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuLW17,
  author       = {Zhengbin Liu and
                  Yongqiang Li and
                  Mingsheng Wang},
  title        = {Optimal Differential Trails in SIMON-like Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {358--379},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.358-379},
  doi          = {10.13154/TOSC.V2017.I1.358-379},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiuWRA17,
  author       = {Yunwen Liu and
                  Glenn De Witte and
                  Adri{\'{a}}n Ranea and
                  Tomer Ashur},
  title        = {Rotational-XOR Cryptanalysis of Reduced-round {SPECK}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {24--36},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.24-36},
  doi          = {10.13154/TOSC.V2017.I3.24-36},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiuWRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MarsonP17,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {Security Notions for Bidirectional Channels},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {405--426},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.405-426},
  doi          = {10.13154/TOSC.V2017.I1.405-426},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MarsonP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MellaDA17,
  author       = {Silvia Mella and
                  Joan Daemen and
                  Gilles Van Assche},
  title        = {New techniques for trail bounds and application to differential trails
                  in Keccak},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {329--357},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.329-357},
  doi          = {10.13154/TOSC.V2017.I1.329-357},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MellaDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MenninkN17,
  author       = {Bart Mennink and
                  Samuel Neves},
  title        = {Optimal PRFs from Blockcipher Designs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {228--252},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.228-252},
  doi          = {10.13154/TOSC.V2017.I3.228-252},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MenninkN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MinematsuI17,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Cryptanalysis of PMACx, PMAC2x, and SIVx},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {162--176},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.162-176},
  doi          = {10.13154/TOSC.V2017.I2.162-176},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MinematsuI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Naya-PlasenciaP17,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Bart Preneel},
  title        = {Preface},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.1-3},
  doi          = {10.13154/TOSC.V2017.I1.1-3},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Naya-PlasenciaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/RotaruSS17,
  author       = {Dragos Rotaru and
                  Nigel P. Smart and
                  Martijn Stam},
  title        = {Modes of Operation Suitable for Computing on Encrypted Data},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {294--324},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.294-324},
  doi          = {10.13154/TOSC.V2017.I3.294-324},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/RotaruSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Ruhault17,
  author       = {Sylvain Ruhault},
  title        = {SoK: Security Models for Pseudo-Random Number Generators},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {506--544},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.506-544},
  doi          = {10.13154/TOSC.V2017.I1.506-544},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Ruhault17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SahaKC17,
  author       = {Dhiman Saha and
                  Sukhendu Kuila and
                  Dipanwita Roy Chowdhury},
  title        = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {240--258},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.240-258},
  doi          = {10.13154/TOSC.V2017.I1.240-258},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SahaKC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunGLYTQH17,
  author       = {Siwei Sun and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Qianqian Yang and
                  Yosuke Todo and
                  Kexin Qiao and
                  Lei Hu},
  title        = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {281--306},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.281-306},
  doi          = {10.13154/TOSC.V2017.I1.281-306},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunGLYTQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/WangSL17,
  author       = {Gaoli Wang and
                  Yanzhao Shen and
                  Fukang Liu},
  title        = {Cryptanalysis of 48-step {RIPEMD-160}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {177--202},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.177-202},
  doi          = {10.13154/TOSC.V2017.I2.177-202},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/WangSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangGM17,
  author       = {Bin Zhang and
                  Xinxin Gong and
                  Willi Meier},
  title        = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {58--81},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.58-81},
  doi          = {10.13154/TOSC.V2017.I4.58-81},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhuMCLJ17,
  author       = {Shuangyi Zhu and
                  Yuan Ma and
                  Tianyu Chen and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {Analysis and Improvement of Entropy Estimators in {NIST} {SP} 800-90B
                  for Non-IID Entropy Sources},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {151--168},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.151-168},
  doi          = {10.13154/TOSC.V2017.I3.151-168},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhuMCLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AshurL16,
  author       = {Tomer Ashur and
                  Yunwen Liu},
  title        = {Rotational Cryptanalysis in the Presence of Constants},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {57--70},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.57-70},
  doi          = {10.13154/TOSC.V2016.I1.57-70},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AshurL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BhaumikN16,
  author       = {Ritam Bhaumik and
                  Mridul Nandi},
  title        = {OleF: an Inverse-Free Online Cipher. An Online {SPRP} with an Optimal
                  Inverse-Free Construction},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {30--51},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.30-51},
  doi          = {10.13154/TOSC.V2016.I2.30-51},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BhaumikN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BiryukovKP16,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich and
                  L{\'{e}}o Perrin},
  title        = {Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and
                  secret SPNs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {226--247},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.226-247},
  doi          = {10.13154/TOSC.V2016.I2.226-247},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BiryukovKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BlondeauN16,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Improved Parameter Estimates for Correlation and Capacity Deviates
                  in Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {162--191},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.162-191},
  doi          = {10.13154/TOSC.V2016.I2.162-191},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BlondeauN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CauchoisLM16,
  author       = {Victor Cauchois and
                  Pierre Loidreau and
                  Nabil Merkiche},
  title        = {Direct construction of quasi-involutory recursive-like {MDS} matrices
                  from 2-cyclic codes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {80--98},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.80-98},
  doi          = {10.13154/TOSC.V2016.I2.80-98},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CauchoisLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauG16,
  author       = {Colin Chaigneau and
                  Henri Gilbert},
  title        = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {114--133},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.114-133},
  doi          = {10.13154/TOSC.V2016.I1.114-133},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChoudhuriM16,
  author       = {Arka Rai Choudhuri and
                  Subhamoy Maitra},
  title        = {Significantly Improved Multi-bit Differentials for Reduced Round Salsa
                  and ChaCha},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {261--287},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.261-287},
  doi          = {10.13154/TOSC.V2016.I2.261-287},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChoudhuriM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEKM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Daniel Kales and
                  Florian Mendel},
  title        = {Practical Key-Recovery Attack on {MANTIS5}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {248--260},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.248-260},
  doi          = {10.13154/TOSC.V2016.I2.248-260},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DongW16,
  author       = {Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision
                  Attacks on Its Hashing Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {13--32},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.13-32},
  doi          = {10.13154/TOSC.V2016.I1.13-32},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DongW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/EndignouxV16,
  author       = {Guillaume Endignoux and
                  Damian Viz{\'{a}}r},
  title        = {Linking Online Misuse-Resistant Authenticated Encryption and Blockwise
                  Attack Models},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {125--144},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.125-144},
  doi          = {10.13154/TOSC.V2016.I2.125-144},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/EndignouxV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GaziPR16,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  title        = {The Exact Security of {PMAC}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {145--161},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.145-161},
  doi          = {10.13154/TOSC.V2016.I2.145-161},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GaziPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GrassiRR16,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Sondre R{\o}njom},
  title        = {Subspace Trail Cryptanalysis and its Applications to {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {192--225},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.192-225},
  doi          = {10.13154/TOSC.V2016.I2.192-225},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GrassiRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNQSS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Kexin Qiao and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
                  for S-box Designs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {33--56},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.33-56},
  doi          = {10.13154/TOSC.V2016.I1.33-56},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
                  Feistel Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {307--337},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.307-337},
  doi          = {10.13154/TOSC.V2016.I2.307-337},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoWLZ16,
  author       = {Zhiyuan Guo and
                  Wenling Wu and
                  Renzhang Liu and
                  Liting Zhang},
  title        = {Multi-key Analysis of Tweakable Even-Mansour with Applications to
                  Minalpher and {OPP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {288--306},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.288-306},
  doi          = {10.13154/TOSC.V2016.I2.288-306},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoWLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/IwataM16,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {Stronger Security Variants of {GCM-SIV}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {134--157},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.134-157},
  doi          = {10.13154/TOSC.V2016.I1.134-157},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/IwataM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Jean16,
  author       = {J{\'{e}}r{\'{e}}my Jean},
  title        = {Cryptanalysis of Haraka},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {1--12},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.1-12},
  doi          = {10.13154/TOSC.V2016.I1.1-12},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Jean16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Quantum Differential and Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {71--94},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.71-94},
  doi          = {10.13154/TOSC.V2016.I1.71-94},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KolblLMR16,
  author       = {Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {1--29},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.1-29},
  doi          = {10.13154/TOSC.V2016.I2.1-29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KolblLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LuykxMN16,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Samuel Neves},
  title        = {Security Analysis of BLAKE2's Modes of Operation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {158--176},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.158-176},
  doi          = {10.13154/TOSC.V2016.I1.158-176},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LuykxMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MikhalevAM16,
  author       = {Vasily Mikhalev and
                  Frederik Armknecht and
                  Christian M{\"{u}}ller},
  title        = {On Ciphers that Continuously Access the Non-Volatile Key},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {52--79},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.52-79},
  doi          = {10.13154/TOSC.V2016.I2.52-79},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MikhalevAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/PerrinU16,
  author       = {L{\'{e}}o Perrin and
                  Aleksei Udovenko},
  title        = {Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {99--124},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.99-124},
  doi          = {10.13154/TOSC.V2016.I2.99-124},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/PerrinU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SarkarS16,
  author       = {Sumanta Sarkar and
                  Habeeb Syed},
  title        = {Lightweight Diffusion Layer: Importance of Toeplitz Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {95--113},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.95-113},
  doi          = {10.13154/TOSC.V2016.I1.95-113},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SarkarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics