Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
From MaRDI portal
Publication:2102073
DOI10.1007/978-3-030-56877-1_15zbMATH Open1504.94102OpenAlexW3048654417WikidataQ119496642 ScholiaQ119496642MaRDI QIDQ2102073FDOQ2102073
Authors: Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-56877-1_15
Recommendations
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Generation of 8-bit S-boxes having almost optimal cryptographic properties using smaller 4-bit S-boxes and finite field multiplication
- Security analysis of S-boxes in symmetric ciphers
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
- Linear redundancy in S-boxes.
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- The software performance of authenticated-encryption modes
- Advances in cryptology -- ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4--8, 2016. Proceedings. Part I
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20--23, 2016. Revised selected papers
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Structural evaluation by generalized integral property
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Whirlwind: a new cryptographic hash function
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Bit-based division property and application to \textsc{Simon} family
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Title not available (Why is that?)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Automatic search of bit-based division property for ARX ciphers and word-based division property
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Automatic search of linear trails in ARX with applications to SPECK and Chaskey
- MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
- Automatic search for the best trails in ARX: application to block cipher \textsc{Speck}
Cited In (11)
- QCB is blindly unforgeable
- XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Improved differential attack on round-reduced LEA
- Rotational differential-linear cryptanalysis revisited
- Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations
- QCB: efficient quantum-secure authenticated encryption
- Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
- Formal verification of arithmetic masking in hardware and software
- Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW
Uses Software
This page was built for publication: Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2102073)