User menu

Improving the security and efficiency of block ciphers based on LS-designs

Bibliographic reference Journault, Anthony ; Standaert, François-Xavier ; Varici, Kerem. Improving the security and efficiency of block ciphers based on LS-designs. In: Designs, Codes and Cryptography, Vol. 82, no.1-2, p. 495-509 (09/01/2017)
Permanent URL
  1. Albrecht M.R., Driessen B., Kavun, E.B., Leander G., Paar C., Yalçin T.: Proceedings on Block ciphers—focus on the linear layer (feat. PRIDE) Part I. In: Garay J.A., Gennaro R. (eds.) Advances in Cryptology—CRYPTO 2014—34th Annual Cryptology Conference, Santa Barbara, 17–21 Aug, 2014. Lecture Notes in Computer Science, vol. 8616, pp. 57–76. Springer, Berlin (2014).
  2. Albrecht Martin R., Rechberger Christian, Schneider Thomas, Tiessen Tyge, Zohner Michael, Ciphers for MPC and FHE, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.430-454, 10.1007/978-3-662-46800-5_17
  3. Augot Daniel, Finiasz Matthieu, Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes, Fast Software Encryption (2015) ISBN:9783662467053 p.3-17, 10.1007/978-3-662-46706-0_1
  4. Biryukov Alex, De Cannière Christophe, Block Ciphers and Systems of Quadratic Equations, Fast Software Encryption (2003) ISBN:9783540204497 p.274-289, 10.1007/978-3-540-39887-5_21
  5. Bogdanov A., Knudsen L.R., Leander G., Standaert F.-X., Steinberger, J.P., Tischhauser E.: Key-alternating ciphers in a provable setting: encryption using a small number of public permutations—(extended abstract). In: Pointcheval D., Johansson T. (eds.) Proceedings on Advances in Cryptology—EUROCRYPT 2012—31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 15–19 Apr 2012. Lecture Notes in Computer Science, vol. 7237, pp. 45–62. Springer, Berlin (2012).
  6. Boura C., Canteaut A.: Zero-sum distinguishers for iterated permutations and application to Keccak-f and Hamsi-256. In: Biryukov A., Gong G., Stinson D.R. (eds.) Selected Areas in Cryptography—17th International Workshop, SAC 2010, Waterloo, 12–13 Aug 2010, Revised Selected Papers. Lecture Notes in Computer Science, vol. 6544, pp. 1–17. Springer, Berlin (2010).
  7. Boura C., Canteaut A. De Cannière C.: Higher-order differential properties of Keccak and Luffa. In: Joux A. (ed.) FSE. Lecture Notes in Computer Science, vol. 6733, pp. 252–269. Springer, Berlin (2011).
  8. Chari Suresh, Jutla Charanjit S., Rao Josyula R., Rohatgi Pankaj, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology — CRYPTO’ 99 (1999) ISBN:9783540663478 p.398-412, 10.1007/3-540-48405-1_26
  9. Courtois Nicolas T., Pieprzyk Josef, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Lecture Notes in Computer Science (2002) ISBN:9783540001713 p.267-287, 10.1007/3-540-36178-2_17
  10. Daemen Joan, Rijmen Vincent, The Wide Trail Design Strategy, Cryptography and Coding (2001) ISBN:9783540430261 p.222-238, 10.1007/3-540-45325-3_20
  11. Daemen J., Rijmen V.: Information Security and Cryptography. The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002)
  12. Daemen Joan, Knudsen Lars, Rijmen Vincent, The block cipher Square, Fast Software Encryption (1997) ISBN:9783540632474 p.149-165, 10.1007/bfb0052343
  13. Daemen J., Peeters M., Van Assche G., Rijmen V.: Nessie proposal: the block cipher Noekeon. Nessie submission (2000). .
  14. Dinur Itai, Shamir Adi, Cube Attacks on Tweakable Black Box Polynomials, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.278-299, 10.1007/978-3-642-01001-9_16
  15. Galice Samuel, Minier Marine, Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds, Progress in Cryptology – AFRICACRYPT 2008 ISBN:9783540681595 p.1-15, 10.1007/978-3-540-68164-9_1
  16. Gérard B., Grosso V., Naya-Plasencia M., Standaert, F.-X.: Block ciphers that are easier to mask: How far can we go? In: Bertoni G., Coron J.-S. (ed.) Proceedings on Cryptographic Hardware and Embedded Systems—CHES 2013—15th International Workshop, Santa Barbara, 20–23 Aug 2013. Lecture Notes in Computer Science, vol. 8086, pp. 383–399. Springer, Berlin (2013).
  17. Gilbert Henri, Peyrin Thomas, Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations, Fast Software Encryption (2010) ISBN:9783642138577 p.365-383, 10.1007/978-3-642-13858-4_21
  18. Grosso V., Leurent G., Standaert F.-X., Varici K.: LS-designs: Bitslice encryption for efficient masked software implementations. In: Cid C., Rechberger C. (eds.): Fast Software Encryption—21st International Workshop, FSE 2014, 3–5 London, 2014, Revised Selected Papers, pp. 18–37. Lecture Notes in Computer Science, vol. 8540, Springer, Berlin (2015).
  19. Guo J., Peyrin T., Poschmann A. Robshaw M.: The LED block cipher. In: Preneel B., Takagi T. (eds.) Proceedings on Cryptographic Hardware and Embedded Systems—CHES 2011—13th International Workshop, Nara, Sep 28–1 Oct 2011. Lecture Notes in Computer Science, vol. 6917, pp. 326–341. Springer, Berlin (2011).
  20. Knudsen L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) Proceedings on Fast Software Encryption: Second International Workshop, Leuven, 14–16 Dec 1994. Lecture Notes in Computer Science, vol. 1008, pp. 196–211. Springer, Berlin (1994).
  21. Knudsen Lars, Leander Gregor, Poschmann Axel, Robshaw Matthew J. B., PRINTcipher: A Block Cipher for IC-Printing, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.16-32, 10.1007/978-3-642-15031-9_2
  22. Knudsen Lars, Wagner David, Integral Cryptanalysis, Fast Software Encryption (2002) ISBN:9783540440093 p.112-127, 10.1007/3-540-45661-9_9
  23. Leander Gregor, Abdelraheem Mohamed Ahmed, AlKhzaimi Hoda, Zenner Erik, A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack, Advances in Cryptology – CRYPTO 2011 (2011) ISBN:9783642227912 p.206-221, 10.1007/978-3-642-22792-9_12
  24. Leander G., Minaud B, Rønjom S.: A generic approach to invariant subspace attacks cryptanalysis of Robin, iSCREAM and Zorro. To Appear in the Proceedings of EUROCRYPT 2015 (2015).
  25. Leander Gregor, Minaud Brice, Rønjom Sondre, A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.254-283, 10.1007/978-3-662-46800-5_11
  26. Minier Marine, Phan Raphael C.-W., Pousse Benjamin, On Integral Distinguishers of Rijndael Family of Ciphers, 10.1080/01611194.2012.635110
  27. Piret G., Roche T., Carlet C.: PICARO—a block cipher allowing efficient higher-order side-channel resistance—extended version-IACR Cryptology ePrint Archive 2012, 358 (2012)
  28. Rivain Matthieu, Prouff Emmanuel, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems, CHES 2010 (2010) ISBN:9783642150302 p.413-427, 10.1007/978-3-642-15031-9_28
  29. Todo Yosuke, Structural Evaluation by Generalized Integral Property, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.287-314, 10.1007/978-3-662-46800-5_12
  30. Ullrich M., De Cannière C., Indesteege S., Küçük Ö., Mouha N., Preneel B.: Finding optimal bitsliced implementations of 4 $${\times }$$ × 4-bit s-boxes. In: SKEW 2011 Symmetric Key Encryption Workshop, Copenhagen, pp. 16–17 (2011)
  31. Wagner David, The Boomerang Attack, Fast Software Encryption (1999) ISBN:9783540662266 p.156-170, 10.1007/3-540-48519-8_12