Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in various scenarios.For word-oriented partial SPN (P-SPN) schemes with a fixed linear layer, our goal is to better understand how the details of the linear layer affect the security of the construction. In this paper, we derive conditions that allow us to either set up or prevent attacks based on infinitely long truncated differentials with probability 1. Our analysis is rather broad compared to earlier independent work on this problem since we consider (1) both invariant and non-invariant/iterative...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Abstract. The linear layer is a core component in any substitution-permutation network block cipher....
Abstract. It is well known that three and four rounds of balanced Feis-tel cipher or Luby-Rackoff (L...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
Abstract — In this paper, we examine a class of block ciphers referred to as substitutionpermutation...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
We consider SPN schemes, i.e., schemes whose non-linear layer is defined as the parallel application...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit blo...
peer reviewedSubstitution-Permutation Networks (SPNs) refer to a family of constructions which buil...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Abstract. The linear layer is a core component in any substitution-permutation network block cipher....
Abstract. It is well known that three and four rounds of balanced Feis-tel cipher or Luby-Rackoff (L...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
Abstract — In this paper, we examine a class of block ciphers referred to as substitutionpermutation...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
We consider SPN schemes, i.e., schemes whose non-linear layer is defined as the parallel application...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit blo...
peer reviewedSubstitution-Permutation Networks (SPNs) refer to a family of constructions which buil...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Abstract. The linear layer is a core component in any substitution-permutation network block cipher....
Abstract. It is well known that three and four rounds of balanced Feis-tel cipher or Luby-Rackoff (L...