GIFT: A Small Present

From MaRDI portal
Publication:5114641

DOI10.1007/978-3-319-66787-4_16zbMath1450.94026OpenAlexW2741840250MaRDI QIDQ5114641

Yu Sasaki, Siang Meng Sim, Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yosuke Todo

Publication date: 24 June 2020

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-66787-4_16




Related Items (61)

Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacksRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingThinking outside the superbox\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsImproved (related-key) differential cryptanalysis on GIFTWARP: revisiting GFN for lightweight 128-bit block cipherAn STP-based model toward designing S-boxes with good cryptographic propertiesCryptanalysis of FlexAEADOn the existence and non-existence of some classes of bent-negabent functionsDifferential-ML distinguisher: machine learning based generic extension for differential cryptanalysisAutomatic search for bit-based division propertyTransparency order of \((n, m)\)-functions -- its further characterization and applications\textsf{Light-OCB}: parallel lightweight authenticated cipher with full securityKey guessing strategies for linear key-schedule algorithms in rectangle attacksA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisOn the relationship between resilient Boolean functions and linear branch number of S-boxesGeneralized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFTOut of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic MatrixOn the existence of special nonlinear invariants for round functions of XSL-ciphersAuthenticated encryption for very short inputsXOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computationNew method for combining Matsui's bounding conditions with sequential encoding methodBlockcipher-based authenticated encryption: how small can we go?FUTURE: a lightweight block cipher using an optimal diffusion matrixA small GIFT-COFB: lightweight bit-serial architecturesCryptanalysis of reduced round SPEEDYImplementing Grover oracle for lightweight block ciphers under depth constraintsLight but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphersKey-reduced variants of 3Kf9 with beyond-birthday-bound securityGeneralized boomerang connectivity table and improved cryptanalysis of GIFTClustering effect of iterative differential and linear trailsMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Differential meet-in-the-middle cryptanalysisStrong and tight security guarantees against integral distinguishersGeneric framework for key-guessing improvementsDEFAULT: cipher level resistance against differential fault attack\textsf{tHyENA}: making \textsf{HyENA} even smaller\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipherAnalyzing masked ciphers against transition and coupling effectsAutomated key recovery attacks on round-reduced OrthrosFour by four MDS matrices with the fewest XOR gates based on wordsQuantum attacks on beyond-birthday-bound MACsSee-in-the-middle attacks on blockciphers ARIA and DEFAULTMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsLower bounds on the degree of block ciphersBeyond birthday bound secure fresh rekeying: application to authenticated encryptionImproved security analysis for nonce-based enhanced hash-then-mask MACsObstacle Numbers of Planar GraphsFinding integral distinguishers with easeA First-Order SCA Resistant AES Without Fresh RandomnessModeling for three-subset division property without unknown subsetMind the composition: birthday bound attacks on EWCDMD and SoKAC21Tight security bounds for double-block hash-then-sum MACsModeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEADFault template attacks on block ciphers exploiting fault propagationAutomatic search of meet-in-the-middle preimage attacks on AES-like hashingGIFTSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsA note on the signal-to-noise ratio of \((n, m)\)-functionsAnalyzing the provable security bounds of GIFT-COFB and Photon-BeetleCryptanalysis of stream cipher LIZARD using division property and MILP based cube attack


Uses Software



This page was built for publication: GIFT: A Small Present