37 research outputs found
On the second-order zero differential spectra of some power functions over finite fields
Boukerrou et al. (IACR Trans. Symmetric Cryptol. 2020(1), 331-362) introduced
the notion of Feistel Boomerang Connectivity Table (FBCT), the Feistel
counterpart of the Boomerang Connectivity Table (BCT), and the Feistel
boomerang uniformity (which is the same as the second-order zero differential
uniformity in even characteristic). FBCT is a crucial table for the analysis of
the resistance of block ciphers to power attacks such as differential and
boomerang attacks. It is worth noting that the coefficients of FBCT are related
to the second-order zero differential spectra of functions. In this paper, by
carrying out certain finer manipulations of solving specific equations over the
finite field , we explicitly determine the second-order zero
differential spectra of some power functions with low differential uniformity,
and show that our considered functions also have low second-order zero
differential uniformity. Our study pushes further former investigations on
second-order zero differential uniformity and Feistel boomerang differential
uniformity for a power function
On the Division Property of SIMON48 and SIMON64
{\sc Simon} is a family of lightweight block ciphers published by the U.S. National Security Agency (NSA) in 2013. Due to its novel and bit-based design, integral cryptanalysis on {\sc Simon} seems a tough job. At EUROCRYPT 2015 Todo proposed division property which is a generalized integral property, and he applied this technique to searching integral distinguishers of {\sc Simon} block ciphers by considering the left and right halves of {\sc Simon} independently. As a result, he found 11-round integral distinguishers for both {\sc Simon}48 and {\sc Simon}64. Recently, at FSE 2016 Todo \emph{et al.} proposed bit-based division property that considered each bit independently. This technique can find more accurate distinguishers, however, as pointed out by Todo \emph{et al.} the time and memory complexity is bounded by for an -bit block cipher. Thus, bit-based division property is only applicable to {\sc Simon}32.
In this paper we propose a new technique that achieves a trade-off between considering each bit independently and considering left and right halves as a whole, which is actually a trade-off between time-memory and the accuracy of the distinguishers. We proceed by splitting the state of {\sc Simon} into small pieces and study the division property propagations of circular shift and bitwise AND operations under the state partition. Moreover, we propose two different state partitions and study the influences of different partitions on the propagation of division property. We find that different partitions greatly impact the division property propagation of circular shift which will finally result in a big difference on the length of integral distinguishers. By using a tailored search algorithm for {\sc Simon}, we find 12-round integral distinguishers for {\sc Simon}48 and {\sc Simon}64 respectively, which improve Todo\u27s results by one round for both variants
Ada-TTA: Towards Adaptive High-Quality Text-to-Talking Avatar Synthesis
We are interested in a novel task, namely low-resource text-to-talking
avatar. Given only a few-minute-long talking person video with the audio track
as the training data and arbitrary texts as the driving input, we aim to
synthesize high-quality talking portrait videos corresponding to the input
text. This task has broad application prospects in the digital human industry
but has not been technically achieved yet due to two challenges: (1) It is
challenging to mimic the timbre from out-of-domain audio for a traditional
multi-speaker Text-to-Speech system. (2) It is hard to render high-fidelity and
lip-synchronized talking avatars with limited training data. In this paper, we
introduce Adaptive Text-to-Talking Avatar (Ada-TTA), which (1) designs a
generic zero-shot multi-speaker TTS model that well disentangles the text
content, timbre, and prosody; and (2) embraces recent advances in neural
rendering to achieve realistic audio-driven talking face video generation. With
these designs, our method overcomes the aforementioned two challenges and
achieves to generate identity-preserving speech and realistic talking person
video. Experiments demonstrate that our method could synthesize realistic,
identity-preserving, and audio-visual synchronized talking avatar videos.Comment: 6 pages, 3 figure
GenerTTS: Pronunciation Disentanglement for Timbre and Style Generalization in Cross-Lingual Text-to-Speech
Cross-lingual timbre and style generalizable text-to-speech (TTS) aims to
synthesize speech with a specific reference timbre or style that is never
trained in the target language. It encounters the following challenges: 1)
timbre and pronunciation are correlated since multilingual speech of a specific
speaker is usually hard to obtain; 2) style and pronunciation are mixed because
the speech style contains language-agnostic and language-specific parts. To
address these challenges, we propose GenerTTS, which mainly includes the
following works: 1) we elaborately design a HuBERT-based information bottleneck
to disentangle timbre and pronunciation/style; 2) we minimize the mutual
information between style and language to discard the language-specific
information in the style embedding. The experiments indicate that GenerTTS
outperforms baseline systems in terms of style similarity and pronunciation
accuracy, and enables cross-lingual timbre and style generalization.Comment: Accepted by INTERSPEECH 202
StyleS2ST: Zero-shot Style Transfer for Direct Speech-to-speech Translation
Direct speech-to-speech translation (S2ST) has gradually become popular as it
has many advantages compared with cascade S2ST. However, current research
mainly focuses on the accuracy of semantic translation and ignores the speech
style transfer from a source language to a target language. The lack of
high-fidelity expressive parallel data makes such style transfer challenging,
especially in more practical zero-shot scenarios. To solve this problem, we
first build a parallel corpus using a multi-lingual multi-speaker
text-to-speech synthesis (TTS) system and then propose the StyleS2ST model with
cross-lingual speech style transfer ability based on a style adaptor on a
direct S2ST system framework. Enabling continuous style space modeling of an
acoustic model through parallel corpus training and non-parallel TTS data
augmentation, StyleS2ST captures cross-lingual acoustic feature mapping from
the source to the target language. Experiments show that StyleS2ST achieves
good style similarity and naturalness in both in-set and out-of-set zero-shot
scenarios.Comment: Accepted to Interspeech 202
Optimized Quantum Implementation of AES
In this paper, we research the implementation of the AES family with Pauli-X gates, CNOT gates and Toffoli gates as the underlying quantum logic gate set. First, we investigate the properties of quantum circuits and the influence of Pauli-X gates, CNOT gates and Toffoli gates on the performance of the circuits constructed with those gates. Based on the properties of quantum circuits as well as our observations on the classical ones built by Boyar \emph{et al.} and Zou \emph{et al.}, we research the construction of reversible circuits for AES\u27s Substitution-box (S-box) and its inverse (S-box) by rearranging the classical implementation to three parts. Since the second part is treated as a 4-bit S-box in this paper and can be dealt with by existing tools, we propose a heuristic to search optimized reversible circuits for the first part and the third part. The application of our method reveals that the reversible circuits constructed for AES S-box and its inverse consume fewer qubits with optimized CNOT gate consumption and Toffoli depth. In addition, we study the construction of reversible circuits for the key schedule and the round function of AES by applying various number of S-boxes in parallel. As a result, we report quantum circuits of AES-128, AES-192 and AES-256 with 269, 333 and 397 qubits, respectively. If more qubits are allowed, quantum circuits that outperform state-of-the-art schemes in the metric of value for the AES family can be reported, and it needs only 474, 538 and 602 qubits for AES-128, AES-192 and AES-256, respectively
A Novel Automatic Technique Based on MILP to Search for Impossible Differentials
The Mixed Integer Linear Programming (MILP) is a common method of searching for impossible differentials (IDs). However, the optimality of the distinguisher should be confirmed by an exhaustive search of all input and output differences, which is clearly computationally infeasible due to the huge search space.
In this paper, we propose a new technique that uses two-dimensional binary variables to model the input and output differences and characterize contradictions with constraints. In our model, the existence of IDs can be directly obtained by checking whether the model has a solution. In addition, our tool can also detect any contradictions between input and output differences by changing the position of the contradictions. Our method is confirmed by applying it to several block ciphers, and our results show that we can find 6-, 13-, and 12-round IDs for Midori-64, CRAFT, and SKINNY-64 within a few seconds, respectively. Moreover, by carefully analyzing the key schedule of Midori-64, we propose an equivalent key transform technique and construct a complete MILP model for an 11-round impossible differential attack (IDA) on Midori-64 to search for the minimum number of keys to be guessed. Based on our automatic technique, we present a new 11-round IDA on Midori-64, where 23 nibbles of keys need to be guessed, which reduces the time complexity compared to previous work. The time and data complexity of our attack are and , respectively. To the best of our knowledge, this is the best IDA on Midori-64 at present