Differential cryptanalysis is about finding trails which involve a low amount of active S-box operations. Such patterns simplify the difference propagation and thus the computations of the secret round keys. The weight of a trail expresses the total number of non-zero S-box input differences within the cipher for a certain execution and is highly dependent on the specified permutation layers. This work copes with analyzing possible permutations in AES-like structures in order to guarantee high-weight trails. The main focus lies on cubed state dimensions. After providing a formalization on the concept of guaranteed trail weights, some characteristcs of equivalent permutation layers due to this definition are shown. One of the advantages is t...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic algorit...
Abstract. Designing block ciphers and hash functions in a manner that resemble the AES in many aspec...
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. Wit...
We present new techniques to efficiently scan the space of high-probability differential trails in b...
International audienceAbout 20 years ago, Wagner showed that most of the (then) known techniques use...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
International audienceDesigning a block cipher or cryptographic permutation can be approached in man...
Abstract. The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both ...
peer reviewedIn this paper we consider the security of block ciphers which contain alternate layers ...
In this study, we accelerate Matsui’s search algorithm to search for the best differential and linea...
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subs...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic algorit...
Abstract. Designing block ciphers and hash functions in a manner that resemble the AES in many aspec...
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. Wit...
We present new techniques to efficiently scan the space of high-probability differential trails in b...
International audienceAbout 20 years ago, Wagner showed that most of the (then) known techniques use...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additiona...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
International audienceDesigning a block cipher or cryptographic permutation can be approached in man...
Abstract. The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both ...
peer reviewedIn this paper we consider the security of block ciphers which contain alternate layers ...
In this study, we accelerate Matsui’s search algorithm to search for the best differential and linea...
Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subs...
Abstract. While the symmetric-key cryptography community has now a good experience on how to build a...
International audienceWhile the symmetric-key cryptography community has now a good experience on ho...
Substitution Boxes (S-boxes) are nonlinear objects often used in the design of cryptographic algorit...