International audienceThis paper investigates large linear mappings with very good diffusion and efficient software implementations, that can be used as part of a block cipher design. The mappings are derived from linear codes over a small field (typically F 2 4) with a high dimension (typically 16) and a high minimum distance. This results in diffusion matrices with equally high dimension and a large branch number. Because we aim for parameters for which no MDS code is known to exist, we propose to use more flexible algebraic-geometry codes. We present two simple yet efficient algorithms for the software implementation of matrix-vector multi-plication in this context, and derive conditions on the generator matrices of the codes to yield ef...
Abstract. In this article, we review the designs of diffusion layers of blocks ciphers based on line...
ISBN : 978-3-319-03514-7International audienceMany recent block ciphers use Maximum Distance Separab...
Cette thèse s’intéresse à deux aspects de la cryptologie symétrique liés à l’utilisation de matrices...
International audienceThis paper investigates large linear mappings with very good diffusion and eff...
Abstract. This paper investigates large linear mappings with very good diffusion and efficient softw...
Matrices are widely used in Block Cipher Diffusion layers, usually chosen for offering maximal branc...
This PhD focuses on the links between error correcting codes and diffusion matrices used in cryptogr...
Abstract—This article presents a new algorithm to find MDS matrices that are well suited for use as ...
International audienceThis article presents a new algorithm to find MDS matrices that are well suite...
International audienceThe aim of this paper is to provide a general framework in the study of binary...
A good linear diffusion layer is a prerequisite in the design of block ciphers. Usually it is obtain...
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known ...
Abstract. MDS matrices allow to build optimal linear diffusion layers in block ciphers. However, MDS...
Binary linear transformations (also called binary matrices) have matrix representations over GF(2). ...
The primary intention of this thesis is to generate lightened Maximum Distance Separable (MDS) matri...
Abstract. In this article, we review the designs of diffusion layers of blocks ciphers based on line...
ISBN : 978-3-319-03514-7International audienceMany recent block ciphers use Maximum Distance Separab...
Cette thèse s’intéresse à deux aspects de la cryptologie symétrique liés à l’utilisation de matrices...
International audienceThis paper investigates large linear mappings with very good diffusion and eff...
Abstract. This paper investigates large linear mappings with very good diffusion and efficient softw...
Matrices are widely used in Block Cipher Diffusion layers, usually chosen for offering maximal branc...
This PhD focuses on the links between error correcting codes and diffusion matrices used in cryptogr...
Abstract—This article presents a new algorithm to find MDS matrices that are well suited for use as ...
International audienceThis article presents a new algorithm to find MDS matrices that are well suite...
International audienceThe aim of this paper is to provide a general framework in the study of binary...
A good linear diffusion layer is a prerequisite in the design of block ciphers. Usually it is obtain...
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known ...
Abstract. MDS matrices allow to build optimal linear diffusion layers in block ciphers. However, MDS...
Binary linear transformations (also called binary matrices) have matrix representations over GF(2). ...
The primary intention of this thesis is to generate lightened Maximum Distance Separable (MDS) matri...
Abstract. In this article, we review the designs of diffusion layers of blocks ciphers based on line...
ISBN : 978-3-319-03514-7International audienceMany recent block ciphers use Maximum Distance Separab...
Cette thèse s’intéresse à deux aspects de la cryptologie symétrique liés à l’utilisation de matrices...