The 128-Bit Blockcipher CLEFIA (Extended Abstract)
From MaRDI portal
Publication:3524890
DOI10.1007/978-3-540-74619-5_12zbMath1186.94471OpenAlexW1569252980MaRDI QIDQ3524890
Toru Akishita, Taizo Shirai, Kyoji Shibutani, Tetsu Iwata, Shiho Moriai
Publication date: 16 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74619-5_12
Related Items (64)
A framework to optimize implementations of matrices ⋮ Very Compact Hardware Implementations of the Blockcipher CLEFIA ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure ⋮ Cryptanalysis of Full Sprout ⋮ A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems ⋮ Counting active S-boxes is not enough ⋮ Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes ⋮ On the relationship between resilient Boolean functions and linear branch number of S-boxes ⋮ Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 ⋮ Exploring lightweight efficiency of ForkAES ⋮ Differential property of \textsc{Present}-like structure ⋮ On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 ⋮ Biclique cryptanalysis of LBlock and TWINE ⋮ Towards the optimality of Feistel ciphers with substitution-permutation functions ⋮ Generalized Feistel networks revisited ⋮ Differential analysis of the extended generalized Feistel networks ⋮ The DBlock family of block ciphers ⋮ Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited ⋮ Optimizing the depth of quantum implementations of linear layers ⋮ Three input exclusive-or gate support for Boyar-Peralta's algorithm ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ Analysis of \(3\)-line generalized Feistel networks with double SD-functions ⋮ On unbalanced feistel networks with contracting MDS diffusion ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data ⋮ Impossible differential attacks on 13-round CLEFIA-128 ⋮ The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers ⋮ Impossible Differential Cryptanalysis of CLEFIA ⋮ Linear hulls with correlation zero and linear cryptanalysis of block ciphers ⋮ Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher ⋮ Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard ⋮ Some results on Fruit ⋮ Cryptographic properties and application of a generalized unbalanced Feistel network structure ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ LBlock: A Lightweight Block Cipher ⋮ Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity ⋮ Making the impossible possible ⋮ Robust Encryption, Revisited ⋮ Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited ⋮ The resistance of PRESENT-80 against related-key differential attacks ⋮ Troika: a ternary cryptographic hash function ⋮ Polynomial Evaluation and Side Channel Analysis ⋮ A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box ⋮ Improved Meet-in-the-Middle Distinguisher on Feistel Schemes ⋮ Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure ⋮ Multiset structural attack on generalized Feistel networks ⋮ On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ On the (im)possibility of improving the round diffusion of generalized Feistel structures ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ On the diffusion of the improved generalized Feistel ⋮ An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines ⋮ Efficient systolic multiplications in composite fields for cryptographic systems ⋮ On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\) ⋮ Tweakable Pseudorandom Permutation from Generalized Feistel Structure ⋮ Improbable differential attacks on \texttt{PRESENT} using undisturbed bits ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Uses Software
This page was built for publication: The 128-Bit Blockcipher CLEFIA (Extended Abstract)