Abstract. Zorro is a 128-bit lightweight block cipher supporting 128-bit keys, presented at CHES 2013 by Gérard et al. One of the main design goals of the cipher was to allow efficient masking, which is a common way to protect against side-channel attacks. This led to a very uncon-ventional design, which resembles AES, but uses only partial non-linear layers. Despite the security claims of the designers, the cipher was re-cently broken by differential and linear attacks due to Wang et al., re-covering its 128-bit key with complexity of about 2108. These attacks are based on high-probability iterative characteristics that are made possible due to a special property of the linear layer of Zorro, which is shown to be devastating in combinatio...
Abstract. In CRYPTO 2014 Albrecht et al. brought in a 20-round it-erative lightweight block cipher P...
Abstract. SIMON is a family of ten lightweight block ciphers published by Beaulieu et al. from U.S. ...
In this article, we provide the first independent security analysis of Deoxys, a third-round authent...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
The design and analysis of lightweight block ciphers has been a very active research area over the l...
Abstract. The design and analysis of lightweight block ciphers has been a very active research area ...
International audienceThe design and analysis of lightweight block ciphers has been a very active re...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Abstract. In CRYPTO 2014 Albrecht et al. brought in a 20-round it-erative lightweight block cipher P...
Abstract. SIMON is a family of ten lightweight block ciphers published by Beaulieu et al. from U.S. ...
In this article, we provide the first independent security analysis of Deoxys, a third-round authent...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
The design and analysis of lightweight block ciphers has been a very active research area over the l...
Abstract. The design and analysis of lightweight block ciphers has been a very active research area ...
International audienceThe design and analysis of lightweight block ciphers has been a very active re...
The design and analysis of lightweight block ciphers is gaining increasing popularity due to the gen...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Abstract. In CRYPTO 2014 Albrecht et al. brought in a 20-round it-erative lightweight block cipher P...
Abstract. SIMON is a family of ten lightweight block ciphers published by Beaulieu et al. from U.S. ...
In this article, we provide the first independent security analysis of Deoxys, a third-round authent...