CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …
implementation of cryptographic primitives after the algorithms have been designed for …
Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis
Resistance against differential cryptanalysis is an important design criteria for any modern
block cipher and most designs rely on finding some upper bound on probability of single …
block cipher and most designs rely on finding some upper bound on probability of single …
Improved rectangle attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E 1∘ E 0, to construct a …
the target cipher E as a composition of two sub-ciphers, ie, E= E 1∘ E 0, to construct a …
Analysis of AES, SKINNY, and others with constraint programming
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis.
In this work, we employ the constraint programming (CP) technique to tackle such problems …
In this work, we employ the constraint programming (CP) technique to tackle such problems …
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal… - … Conference on the …, 2019 - Springer
Highly efficient encryption and authentication of short messages is an essential requirement
for enabling security in constrained scenarios such as the CAN FD in automotive systems …
for enabling security in constrained scenarios such as the CAN FD in automotive systems …
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny
L Qin, X Dong, X Wang, K Jia, Y Liu - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Automatic modelling to search distinguishers with high probability covering as many rounds
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
Security analysis of SKINNY under related-tweakey settings
In CRYPTO'16, a new family of tweakable lightweight block ciphers-SKINNY was introduced.
Denoting the variants of SKINNY as SKINNY-$ n $-$ t $, where $ n $ represents the block …
Denoting the variants of SKINNY as SKINNY-$ n $-$ t $, where $ n $ represents the block …
Cryptanalysis of reduced round SKINNY block cipher
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest
hardware footprint. In this paper, we present zero-correlation linear approximations and the …
hardware footprint. In this paper, we present zero-correlation linear approximations and the …
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
This paper gives a new generalized key-recovery model of related-key rectangle attacks on
block ciphers with linear key schedules. The model is quite optimized and applicable to …
block ciphers with linear key schedules. The model is quite optimized and applicable to …