Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
Survey on cyberspace security
H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …
society has entered the information era. In this era, people live and work in cyberspace …
Midori: A Block Cipher for Low Energy
In the past few years, lightweight cryptography has become a popular research discipline
with a number of ciphers and hash functions proposed. The designers' focus has been …
with a number of ciphers and hash functions proposed. The designers' focus has been …
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block …
We propose two systematic methods to describe the differential property of an S-box with
linear inequalities based on logical condition modelling and computational geometry …
linear inequalities based on logical condition modelling and computational geometry …
CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …
implementation of cryptographic primitives after the algorithms have been designed for …
New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers
Y Sasaki, Y Todo - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
In this paper, a new tool searching for impossible differentials is presented. Our tool can
detect any contradiction between input and output differences. It can also take into account …
detect any contradiction between input and output differences. It can also take into account …
Formal verification of masked hardware implementations in the presence of glitches
Masking provides a high level of resistance against side-channel analysis. However, in
practice there are many possible pitfalls when masking schemes are applied, and …
practice there are many possible pitfalls when masking schemes are applied, and …
Efficient MILP modelings for sboxes and linear layers of SPN ciphers
C Boura, D Coggia - IACR Transactions on Symmetric Cryptology, 2020 - inria.hal.science
Mixed Integer Linear Programming (MILP) solvers are regularly used by designers for
providing security arguments and by cryptanalysts for searching for new distinguishers. For …
providing security arguments and by cryptanalysts for searching for new distinguishers. For …
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with …
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the
differential and linear behavior of a wide range of block ciphers. We point out that the …
differential and linear behavior of a wide range of block ciphers. We point out that the …