LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
From MaRDI portal
Publication:2946901
DOI10.1007/978-3-662-46706-0_2zbMath1382.94111OpenAlexW930621015MaRDI QIDQ2946901
Kerem Varici, Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-01093491/file/bislice_cipher.pdf
Related Items (31)
\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A new non-random property of 4.5-round PRINCE ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Differential uniformity and linearity of S-boxes by multiplicative complexity ⋮ New observations on invariant subspace attack ⋮ Improved filter permutators for efficient FHE: better instances and implementations ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ Nonlinear Invariant Attack ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity ⋮ RAMus- a new lightweight block cipher for RAM encryption ⋮ Boomerang uniformity of popular S-box constructions ⋮ On degree-\(d\) zero-sum sets of full rank ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Differential-linear and related key cryptanalysis of round-reduced scream ⋮ Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ Nonlinear diffusion layers ⋮ Related-Key Attack on Full-Round PICARO ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ New classes of $8$-bit permutations based on a butterfly structure ⋮ Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций ⋮ Leakage resilient value comparison with application to message authentication ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ Cryptanalysis results on spook. Bringing full-round shadow-512 to the light ⋮ Differential fault attack on lightweight block cipher PIPO
This page was built for publication: LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations