Improving the security and efficiency of block ciphers based on LS-designs

作者: Anthony Journault , François-Xavier Standaert , Kerem Varici

DOI: 10.1007/S10623-016-0193-8

关键词:

摘要: … First, we analyze the invariant subspace attack against Robin and show that it can be prevented with simple heuristics, eg a better choice of round constants. For this purpose, we exploit …

参考文章(31)
Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın, Block Ciphers – Focus on the Linear Layer (feat. PRIDE) Advances in Cryptology – CRYPTO 2014. pp. 57- 76 ,(2014) , 10.1007/978-3-662-44371-2_4
David Wagner, The Boomerang Attack fast software encryption. pp. 156- 170 ,(1999) , 10.1007/3-540-48519-8_12
Daniel Augot, Matthieu Finiasz, Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes Fast Software Encryption. ,vol. 8540, pp. 3- 17 ,(2015) , 10.1007/978-3-662-46706-0_1
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner, A cryptanalysis of PRINTcipher: the invariant subspace attack international cryptology conference. pp. 206- 221 ,(2011) , 10.1007/978-3-642-22792-9_12
Gilles Piret, Thomas Roche, Claude Carlet, PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance Applied Cryptography and Network Security. pp. 311- 328 ,(2012) , 10.1007/978-3-642-31284-7_19
Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner, Ciphers for MPC and FHE theory and application of cryptographic techniques. pp. 430- 454 ,(2015) , 10.1007/978-3-662-46800-5_17
Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varıcı, LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations Fast Software Encryption. pp. 18- 37 ,(2015) , 10.1007/978-3-662-46706-0_2
Henri Gilbert, Thomas Peyrin, Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations Fast Software Encryption. pp. 365- 383 ,(2010) , 10.1007/978-3-642-13858-4_21
Samuel Galice, Marine Minier, Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds Progress in Cryptology – AFRICACRYPT 2008. pp. 1- 15 ,(2008) , 10.1007/978-3-540-68164-9_1
Joan Daemen, Vincent Rijmen, The Wide Trail Design Strategy Lecture Notes in Computer Science. ,vol. 2260, pp. 222- 238 ,(2001) , 10.1007/3-540-45325-3_20