Boolean functions for cryptography and coding theory

C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …

Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

Midori: A Block Cipher for Low Energy

S Banik, A Bogdanov, T Isobe, K Shibutani… - Advances in Cryptology …, 2015 - Springer
In the past few years, lightweight cryptography has become a popular research discipline
with a number of ciphers and hash functions proposed. The designers' focus has been …

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block …

S Sun, L Hu, P Wang, K Qiao, X Ma, L Song - Advances in Cryptology …, 2014 - Springer
We propose two systematic methods to describe the differential property of an S-box with
linear inequalities based on logical condition modelling and computational geometry …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers

Y Sasaki, Y Todo - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
In this paper, a new tool searching for impossible differentials is presented. Our tool can
detect any contradiction between input and output differences. It can also take into account …

Formal verification of masked hardware implementations in the presence of glitches

R Bloem, H Groß, R Iusupov, B Könighofer… - Advances in Cryptology …, 2018 - Springer
Masking provides a high level of resistance against side-channel analysis. However, in
practice there are many possible pitfalls when masking schemes are applied, and …

Efficient MILP modelings for sboxes and linear layers of SPN ciphers

C Boura, D Coggia - IACR Transactions on Symmetric Cryptology, 2020 - inria.hal.science
Mixed Integer Linear Programming (MILP) solvers are regularly used by designers for
providing security arguments and by cryptanalysts for searching for new distinguishers. For …

Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with …

S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma… - Cryptology ePrint …, 2014 - eprint.iacr.org
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the
differential and linear behavior of a wide range of block ciphers. We point out that the …