LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
From MaRDI portal
Publication:2946901
DOI10.1007/978-3-662-46706-0_2zbMATH Open1382.94111OpenAlexW930621015MaRDI QIDQ2946901FDOQ2946901
Kerem Varici, François-Xavier Standaert, Vincent Grosso, Gaëtan Leurent
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-01093491/file/bislice_cipher.pdf
Cited In (34)
- How Fast Can Higher-Order Masking Be in Software?
- Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
- Differential fault attack on lightweight block cipher PIPO
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A MAC Mode for Lightweight Block Ciphers
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- RAMus- a new lightweight block cipher for RAM encryption
- Differential-linear and related key cryptanalysis of round-reduced scream
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
- Boomerang uniformity of popular S-box constructions
- A further study on bridge structures and constructing bijective S-boxes for low-latency masking
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
- Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR
- New observations on invariant subspace attack
- Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Nonlinear Invariant Attack
- MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
- Nonlinear diffusion layers
- Leakage resilient value comparison with application to message authentication
- Generalized Feistel ciphers for efficient prime field masking
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
- Related-Key Attack on Full-Round PICARO
- New classes of $8$-bit permutations based on a butterfly structure
- Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций
- A theoretical analysis of generalized invariants of bijective S-boxes
- Improving the security and efficiency of block ciphers based on LS-designs
- Tornado: automatic generation of probing-secure masked bitsliced implementations
- Differential uniformity and linearity of S-boxes by multiplicative complexity
- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask
- On degree-\(d\) zero-sum sets of full rank
- Improved filter permutators for efficient FHE: better instances and implementations
This page was built for publication: LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946901)