New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers
Y Sasaki, Y Todo - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
In this paper, a new tool searching for impossible differentials is presented. Our tool can
detect any contradiction between input and output differences. It can also take into account …
detect any contradiction between input and output differences. It can also take into account …
Secure hardware implementation of nonlinear functions in the presence of glitches
Hardware implementations of cryptographic algorithms are vulnerable to side-channel
attacks. Side-channel attacks that are based on multiple measurements of the same …
attacks. Side-channel attacks that are based on multiple measurements of the same …
LS-designs: Bitslice encryption for efficient masked software implementations
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
Design Strategies for ARX with Provable Bounds: Sparx and LAX
We present, for the first time, a general strategy for designing ARX symmetric-key primitives
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
Efficient MILP modelings for sboxes and linear layers of SPN ciphers
C Boura, D Coggia - IACR Transactions on Symmetric Cryptology, 2020 - inria.hal.science
Mixed Integer Linear Programming (MILP) solvers are regularly used by designers for
providing security arguments and by cryptanalysts for searching for new distinguishers. For …
providing security arguments and by cryptanalysts for searching for new distinguishers. For …
S-box construction based on linear fractional transformation and permutation function
LC Nizam Chew, ES Ismail - Symmetry, 2020 - mdpi.com
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …
Image encryption algorithm using S-box and dynamic Hénon bit level permutation
For the secure transmission of data through the medium of internet, images have significant
importance. Image encryption provides secure transmission of images by converting …
importance. Image encryption provides secure transmission of images by converting …
Shorter linear straight-line programs for MDS matrices
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …
Efficient crypto engine for authenticated encryption, data traceability, and replay attack detection over CAN bus network
Smart vehicles and industrial control systems becoming increasingly complex. They are
comprised of a large number of connected intelligence sensor devices. For such systems …
comprised of a large number of connected intelligence sensor devices. For such systems …
Superball: a new approach for MILP modelings of Boolean functions
T Li, Y Sun - IACR Transactions on Symmetric Cryptology, 2022 - tosc.iacr.org
Abstract Mixed Integer Linear Programming (MILP) solver has become one of the most
powerful tools of searching for cryptographic characteristics. It has great significance to study …
powerful tools of searching for cryptographic characteristics. It has great significance to study …