Jaechul Sung
YOU?
Author Swipe
View article: LCIRC: A Recurrent Compression Approach for Efficient Long-form Context and Query Dependent Modeling in LLMs
LCIRC: A Recurrent Compression Approach for Efficient Long-form Context and Query Dependent Modeling in LLMs Open
While large language models (LLMs) excel in generating coherent and contextually rich outputs, their capacity to efficiently handle long-form contexts is limited by fixed-length position embeddings. Additionally, the computational cost of …
View article: Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks
Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks Open
In this study, we focus on evaluating the false-positive probability of the Demirci-Selçuk meet-in-the-middle attack, particularly within the context of configuring precomputed tables with multisets. During the attack, the adversary effect…
View article: Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs
Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs Open
At EUROCRYPT 2017, Grassi et al. proposed the multiple-of-8 property for 5-round , where the number of right pairs is a multiple of 8. At ToSC 2019, Boura et al. generalized the multiple-of property for a general SPN block cipher and appl…
View article: A Practical Ciphertext-Only Attack on GMR-2 System
A Practical Ciphertext-Only Attack on GMR-2 System Open
We present a ciphertext-only attack on the GEO-Mobile Radio Interface-2 (GMR-2) system for the first time. The GMR-2 is a satellite communication standard adopted by Inmarsat, a British satellite telecommunications company that offers glob…
View article: Accelerating the Best Trail Search on AES-Like Ciphers
Accelerating the Best Trail Search on AES-Like Ciphers Open
In this study, we accelerate Matsui’s search algorithm to search for the best differential and linear trails of AES-like ciphers. Our acceleration points are twofold. The first exploits the structure and branch number of an AES-like round …
View article: Integral Cryptanalysis of Lightweight Block Cipher PIPO
Integral Cryptanalysis of Lightweight Block Cipher PIPO Open
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations. In this study, we use bit-based division p…
View article: Improved Ciphertext-Only Attack on GMR-1
Improved Ciphertext-Only Attack on GMR-1 Open
The GEO-Mobile Radio Interface-1 (GMR-1) is a satellite communication standard used in Thuraya, a United Arab Emirates-based regional mobile satellite service provider. The specification of the encryption algorithm used in GMR-1 was not di…
View article: A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application Open
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, they have low diffusion effects, compared to word-oriented binary and maximum distance separable (MDS) matrices. Thus, the security of bit …
View article: Classification of 4-bit S-Boxes for BOGI Permutation
Classification of 4-bit S-Boxes for BOGI Permutation Open
Bad Output must go to Good Input (BOGI) is the primary design strategy of GIFT, a lightweight block cipher that was presented at CHES 2017. Because this strategy obviates the need to adhere to the required conditions of S-boxes when adopti…
View article: Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers Open
본 논문에서 우리는 ARX 구조를 가지는 블록 암호에 대한 차분 경로 탐색을 효율적으로 수행하는 방법에 대해 제안한다. 우리는 두 가지 기법을 이용하여 A. Biryukov 등이 제안한 차분 경로 자동 탐색하는 알고리즘을 최적화하였고, 이를 블록 암호 SPECK에 적용하여 Birykov의 결과보다 2~3배 향상된 결과를 얻었다. 이는 ARX 구조를 가지는 블록 암호에 대한 기제안된 결과보다 더 좋은 차분 경로를 찾는데 도움을…
View article: The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks Open
Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing. …