Proving resistance against invariant attacks: how to choose the round constants
From MaRDI portal
Publication:1680234
DOI10.1007/978-3-319-63715-0_22zbMath1410.94045OpenAlexW2728494734MaRDI QIDQ1680234
Anne Canteaut, Gregor Leander, Christof Beierle, Yann Rotella
Publication date: 15 November 2017
Full work available at URL: https://hal.inria.fr/hal-01631130/document
block cipherprincenonlinear invariantinvariant subspace attackskinnyLEDlinear layermantismidoriround constants
Related Items (15)
On the resilience of Even-Mansour to invariant permutations ⋮ A new non-random property of 4.5-round PRINCE ⋮ Weak-key distinguishers for AES ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Pitfalls and shortcomings for decompositions and alignment ⋮ An algebraic approach to symmetric linear layers in cryptographic primitives ⋮ On the primitivity of the AES-128 key-schedule ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ Troika: a ternary cryptographic hash function ⋮ On invariant subspaces in the Lai-Massey scheme and a primitivity reduction ⋮ \textsc{Friet}: an authenticated encryption scheme with built-in fault detection
This page was built for publication: Proving resistance against invariant attacks: how to choose the round constants