A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
[chapter]
2015
Lecture Notes in Computer Science
We apply this algorithm to the CAESAR candidate iSCREAM, the closely related LS-design Robin, as well as the lightweight cipher Zorro. ...
Here, based on a rather simple observation, we introduce a generic algorithm to detect invariant subspaces. ...
Acknowledgments The authors would like to thank Henri Gilbert for many fruitful discussions related to the attacks presented in this article. ...
doi:10.1007/978-3-662-46800-5_11
fatcat:xz2bxp7hifec5n3ucjfsyqhi7m
Correlation Differential Power Analysis Attack to Midori64
[article]
2021
arXiv
pre-print
In this paper, a differential power attack (DPA) to the Midori64 block cipher is designed. ...
Furthermore, we obtained the master key with a smaller number of samples than the electromagnetic analysis attack. ...
Acknowledgment The authors want to thank Mr. Mohammad Gholi, Mr. Habibi, and Mr. Mahdavi for their kind contributions during this paper. ...
arXiv:2108.11115v1
fatcat:7bsha7noszesveqkywxuxoitym
Catalog and Illustrative Examples of Lightweight Cryptographic Primitives
[chapter]
2021
Security of Ubiquitous Computing Systems
AbstractThe main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main ...
cryptographic features, ultimate hardware performance, and existing security analysis, so they can easily compare the ciphers or choose some of them according to their needs. ...
In the first part, a generic approach for security evaluation is discussed, and in the second an advanced dedicated approach is pointed out. ...
doi:10.1007/978-3-030-10591-4_2
fatcat:d2gtrxu225asnmubp5ezfloz3m
Subspace Trail Cryptanalysis and its Applications to AES
2017
IACR Transactions on Symmetric Cryptology
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. ...
With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector. ...
We also thank Charles Bouillaguet for helping us with the tool described in [BDF11] to find attacks that better match the settings we consider. ...
doi:10.13154/tosc.v2016.i2.192-225
dblp:journals/tosc/GrassiRR16
fatcat:rm7yye34gvg3dc7s6jpo3hv72e
Subspace Trail Cryptanalysis and its Applications to AES
2017
IACR Transactions on Symmetric Cryptology
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. ...
With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector. ...
We also thank Charles Bouillaguet for helping us with the tool described in [BDF11] to find attacks that better match the settings we consider. ...
doi:10.46586/tosc.v2016.i2.192-225
fatcat:7xxvgajoyfhc3cdalrzfxm7j3i
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
2017
IACR Transactions on Symmetric Cryptology
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to { ...
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of ...
We express gratitude to the authors of [BJK + 16] for the fruitful interaction, in particular to Christof Beierle for sharing his MILP modelling of the Class I state transitions used in § 3.1.2. ...
doi:10.13154/tosc.v2017.i1.4-44
dblp:journals/tosc/Avanzi17
fatcat:l5zgiqa3lzedpdajqqomixpabe
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
2017
IACR Transactions on Symmetric Cryptology
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to { ...
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of ...
We express gratitude to the authors of [BJK + 16] for the fruitful interaction, in particular to Christof Beierle for sharing his MILP modelling of the Class I state transitions used in § 3.1.2. ...
doi:10.46586/tosc.v2017.i1.4-44
fatcat:iaiczp4lhzh5pgz4quzhjcj3jm