International audienceDesign of SP networks in which the non-linear layer is applied to only a part of the state in each round was suggested by Gérard et al. at CHES 2013. Besides performance advantage on certain platforms, such a design allows for more efficient masking techniques that can mitigate side-channel attacks with a small performance overhead.In this paper we present generic techniques for differential and linear cryptanalysis of SP networks with partial non-linear layers, including an automated characteristic search tool and dedicated key-recovery algorithms. Our techniques can be used both for cryptanalysis of such schemes and for proving their security with respect to basic differential and linear cryptanalysis, succeeding whe...
International audienceThe design and analysis of lightweight block ciphers has been a very active re...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-ch...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
Abstract. Zorro is a 128-bit lightweight block cipher supporting 128-bit keys, presented at CHES 201...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
The design and analysis of lightweight block ciphers has been a very active research area over the l...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Abstract. The design and analysis of lightweight block ciphers has been a very active research area ...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
International audienceThe design and analysis of lightweight block ciphers has been a very active re...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-ch...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...
International audienceDesign of SP networks in which the non-linear layer is applied to only a part ...
Abstract. Design of SP networks in which the non-linear layer is applied to only a part of the state...
Abstract. Zorro is a 128-bit lightweight block cipher supporting 128-bit keys, presented at CHES 201...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
Abstract. An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it ha...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
The design and analysis of lightweight block ciphers has been a very active research area over the l...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Abstract. The design and analysis of lightweight block ciphers has been a very active research area ...
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN)...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
International audienceThe design and analysis of lightweight block ciphers has been a very active re...
Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-ch...
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-k...