Improving the security and efficiency of block ciphers based on LS-designs
From MaRDI portal
Publication:510503
DOI10.1007/S10623-016-0193-8zbMath1402.94060OpenAlexW2293816169WikidataQ58764901 ScholiaQ58764901MaRDI QIDQ510503
François-Xavier Standaert, Anthony Journault, Kerem Varici
Publication date: 10 February 2017
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-01276503/file/wcc15-fr1-2.pdf
Related Items (4)
A MAC Mode for Lightweight Block Ciphers ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Block Ciphers That Are Easier to Mask: How Far Can We Go?
- Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
- Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Structural Evaluation by Generalized Integral Property
- Ciphers for MPC and FHE
- Higher-Order Differential Properties of Keccak and Luffa
- Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
- The LED Block Cipher
- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- PRINTcipher: A Block Cipher for IC-Printing
- Provably Secure Higher-Order Masking of AES
- Cube Attacks on Tweakable Black Box Polynomials
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- The Wide Trail Design Strategy
- The block cipher Square
- On Integral Distinguishers of Rijndael Family of Ciphers
- Towards sound approaches to counteract power-analysis attacks
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Fast Software Encryption
This page was built for publication: Improving the security and efficiency of block ciphers based on LS-designs