LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations

From MaRDI portal
Publication:2946901

DOI10.1007/978-3-662-46706-0_2zbMath1382.94111OpenAlexW930621015MaRDI QIDQ2946901

Kerem Varici, Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert

Publication date: 18 September 2015

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://hal.inria.fr/hal-01093491/file/bislice_cipher.pdf




Related Items (31)

\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA new non-random property of 4.5-round PRINCEWARP: revisiting GFN for lightweight 128-bit block cipherDifferential uniformity and linearity of S-boxes by multiplicative complexityNew observations on invariant subspace attackImproved filter permutators for efficient FHE: better instances and implementationsCUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskA further study on bridge structures and constructing bijective S-boxes for low-latency maskingNonlinear Invariant AttackA theoretical analysis of generalized invariants of bijective S-boxesMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityRAMus- a new lightweight block cipher for RAM encryptionBoomerang uniformity of popular S-box constructionsOn degree-\(d\) zero-sum sets of full rankA MAC Mode for Lightweight Block CiphersImproving the security and efficiency of block ciphers based on LS-designsDifferential-linear and related key cryptanalysis of round-reduced screamParallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelHow Fast Can Higher-Order Masking Be in Software?Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64Nonlinear diffusion layersRelated-Key Attack on Full-Round PICAROConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresNew classes of $8$-bit permutations based on a butterfly structureПостроение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функцийLeakage resilient value comparison with application to message authenticationCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeLightweight Multiplication in $$GF(2^n)$$ with Applications to MDS MatricesMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleCryptanalysis results on spook. Bringing full-round shadow-512 to the lightDifferential fault attack on lightweight block cipher PIPO




This page was built for publication: LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations