Abstract. In this paper, we propose two systematic methods to describe the differential property of an S-box with linear inequalities based on log-ical condition modelling and computational geometry. In one method, in-equalities are generated according to some conditional differential prop-erties of the S-box; in the other method, inequalities are extracted from the H-representation of the convex hull of all possible differential patterns of the S-box. For the second method, we develop a greedy algorithm for selecting a given number of inequalities from the convex hull. Using these inequalities combined with Mixed-Integer Linear Programming (MILP) technique, we propose an automatic method for evaluating the security of bit-oriented block ci...
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differ...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Division property is a cryptanalysis method that proves to be very efficient on block ciphers. Compu...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of sy...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Abstract. We present the first automatic search algorithms for the best related-key differential cha...
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to som...
peer reviewedWe present the first automatic search algorithms for the best related-key differential ...
peer reviewedWhile di fferential behavior of modern ciphers in a single secret key scenario is relat...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed sy...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differ...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Division property is a cryptanalysis method that proves to be very efficient on block ciphers. Compu...
Abstract. In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the...
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of sy...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Abstract. We present the first automatic search algorithms for the best related-key differential cha...
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to som...
peer reviewedWe present the first automatic search algorithms for the best related-key differential ...
peer reviewedWhile di fferential behavior of modern ciphers in a single secret key scenario is relat...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it...
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed sy...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differ...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Division property is a cryptanalysis method that proves to be very efficient on block ciphers. Compu...