New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers

Y Sasaki, Y Todo - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
In this paper, a new tool searching for impossible differentials is presented. Our tool can
detect any contradiction between input and output differences. It can also take into account …

Secure hardware implementation of nonlinear functions in the presence of glitches

S Nikova, V Rijmen, M Schläffer - Journal of Cryptology, 2011 - Springer
Hardware implementations of cryptographic algorithms are vulnerable to side-channel
attacks. Side-channel attacks that are based on multiple measurements of the same …

LS-designs: Bitslice encryption for efficient masked software implementations

V Grosso, G Leurent, FX Standaert, K Varıcı - … 2014, London, UK, March 3-5 …, 2015 - Springer
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …

Design Strategies for ARX with Provable Bounds: Sparx and LAX

D Dinu, L Perrin, A Udovenko, V Velichkov… - Advances in Cryptology …, 2016 - Springer
We present, for the first time, a general strategy for designing ARX symmetric-key primitives
with provable resistance against single-trail differential and linear cryptanalysis. The latter …

Efficient MILP modelings for sboxes and linear layers of SPN ciphers

C Boura, D Coggia - IACR Transactions on Symmetric Cryptology, 2020 - inria.hal.science
Mixed Integer Linear Programming (MILP) solvers are regularly used by designers for
providing security arguments and by cryptanalysts for searching for new distinguishers. For …

S-box construction based on linear fractional transformation and permutation function

LC Nizam Chew, ES Ismail - Symmetry, 2020 - mdpi.com
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …

Image encryption algorithm using S-box and dynamic Hénon bit level permutation

B Idrees, S Zafar, T Rashid, W Gao - Multimedia Tools and Applications, 2020 - Springer
For the secure transmission of data through the medium of internet, images have significant
importance. Image encryption provides secure transmission of images by converting …

Shorter linear straight-line programs for MDS matrices

T Kranz, G Leander, K Stoffelen… - IACR Transactions on …, 2017 - tosc.iacr.org
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …

Efficient crypto engine for authenticated encryption, data traceability, and replay attack detection over CAN bus network

A Rasheed, M Baza, MM Badr… - … on Network Science …, 2023 - ieeexplore.ieee.org
Smart vehicles and industrial control systems becoming increasingly complex. They are
comprised of a large number of connected intelligence sensor devices. For such systems …

Superball: a new approach for MILP modelings of Boolean functions

T Li, Y Sun - IACR Transactions on Symmetric Cryptology, 2022 - tosc.iacr.org
Abstract Mixed Integer Linear Programming (MILP) solver has become one of the most
powerful tools of searching for cryptographic characteristics. It has great significance to study …