Midori: A Block Cipher for Low Energy

From MaRDI portal
Publication:2795984

DOI10.1007/978-3-662-48800-3_17zbMath1382.94057OpenAlexW2293947265MaRDI QIDQ2795984

Francesco Regazzoni, Andrey Bogdanov, Takanori Isobe, Subhadeep Banik, Harunaga Hiwatari, Kyoji Shibutani, Toru Akishita

Publication date: 23 March 2016

Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-48800-3_17




Related Items

Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applicationsProvable one-XOR matrices for construction of 4 × 4 hardware-oriented MDS diffusion layersRelated-key analysis of generalized Feistel networks with expanding round functionsImproved Integral Attack on Generalized Feistel CipherOn the resilience of Even-Mansour to invariant permutations\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA new non-random property of 4.5-round PRINCEPRINCEv2. More security for (almost) no overheadWARP: revisiting GFN for lightweight 128-bit block cipherAn STP-based model toward designing S-boxes with good cryptographic propertiesAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreRelated-Key Cryptanalysis of MidoriPractical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCEMore accurate division property propagations based on optimized implementations of linear layersTransparency order of \((n, m)\)-functions -- its further characterization and applicationsNew observations on invariant subspace attackExploring lightweight efficiency of ForkAESGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTOn the existence of special nonlinear invariants for round functions of XSL-ciphersAn efficient strategy to construct a better differential on multiple-branch-based designs: application to OrthrosRotational differential-linear cryptanalysis revisitedXOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computationNonlinear Invariant AttackImproved heuristics for low-latency implementations of linear layersEnergy consumption of protected cryptographic hardware cores. An experimental studyFUTURE: a lightweight block cipher using an optimal diffusion matrixCryptanalysis of reduced round SPEEDYA theoretical analysis of generalized invariants of bijective S-boxesSide-Channel Analysis Protection and Low-Latency in ActionOptimizing the depth of quantum implementations of linear layersFour by four MDS matrices with the fewest XOR gates based on wordsImpossible differential cryptanalysis on reduced-round PRINCEcoreOn the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxesFrom unbalanced to perfect: implementation of low energy stream ciphersA new construction for involutions over finite fieldsBoomerang uniformity of popular S-box constructionsMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionOn degree-\(d\) zero-sum sets of full rankThe phantom of differential characteristicsMind the gap -- a closer look at the security of block ciphers against differential cryptanalysisBounding the length of impossible differentials for SPN block ciphersInvolutory differentially 4-uniform permutations from known constructionsNonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64Cryptographic properties of cyclic binary matricesBlock cipher invariants as eigenvectors of correlation matricesNonlinear diffusion layersConstruction of MDS matrices from generalized Feistel structuresО линейном и разностном криптоанализе AES-подобных алгоритмов шифрованияNew slide attacks on almost self-similar ciphersThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsA note on the signal-to-noise ratio of \((n, m)\)-functionsCryptanalysis results on spook. Bringing full-round shadow-512 to the lightA Search Strategy to Optimize the Affine Variant Properties of S-BoxesNew Impossible Differential Search Tool from Design and Cryptanalysis AspectsIntegral characteristics by keyspace partitioning


Uses Software