{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T15:49:43Z","timestamp":1773676183112,"version":"3.50.1"},"reference-count":0,"publisher":"Universitatsbibliothek der Ruhr-Universitat Bochum","issue":"1","license":[{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ToSC"],"abstract":"<jats:p>In this work, we present new cryptanalytic attacks on recently proposed, theory-inspired constructions of weak pseudorandom functions (weak-PRFs). We demonstrate attacks on several such designs, showing that the initial security arguments require significant refinement. Methodologically, our approach relies on novel observations about the structure of cyclic matrices, applications of Wagner\u2019s generalized birthday technique, and conversion into polynomial systems over F3. These findings highlight the need for a more careful analysis of those weak-PRF candidates.<\/jats:p>","DOI":"10.46586\/tosc.v2026.i1.95-118","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:17:50Z","timestamp":1773670670000},"page":"95-118","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Two Alternating Moduli Weak PRFs"],"prefix":"10.46586","volume":"2026","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3552-7200","authenticated-orcid":false,"given":"Kai","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2579-8587","authenticated-orcid":false,"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9779-5986","authenticated-orcid":false,"given":"H\u00e5vard","family":"Raddum","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1437-199X","authenticated-orcid":false,"given":"Arne","family":"Sandrib","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8318-6274","authenticated-orcid":false,"given":"Aleksei","family":"Udovenko","sequence":"additional","affiliation":[]}],"member":"25480","published-online":{"date-parts":[[2026,3,16]]},"container-title":["IACR Transactions on Symmetric Cryptology"],"original-title":[],"link":[{"URL":"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/download\/12780\/12469","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/download\/12780\/12469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:17:50Z","timestamp":1773670670000},"score":1,"resource":{"primary":{"URL":"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/12780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,16]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,3,16]]}},"URL":"https:\/\/doi.org\/10.46586\/tosc.v2026.i1.95-118","relation":{},"ISSN":["2519-173X"],"issn-type":[{"value":"2519-173X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,16]]}}}