Block ciphers such as the Advanced Encryption Standard (Rijndael) are used extensively in practice, yet our understanding of their security continues to be highly incomplete. This paper promotes and continues a research program aimed at *proving* the security of block ciphers against important and well-studied classes of attacks. In particular, we initiate the study of (almost) $t$-wise independence of concrete block-cipher construction paradigms such as substitution-permutation networks and key-alternating ciphers. Sufficiently strong (almost) pairwise independence already suffices to resist (truncated) differential attacks and linear cryptanalysis, and hence this is a relevant and meaningful target. Our results are two-fold. Our first re...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal ...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
Block ciphers probably figure in the list of the most important cryptographic primitives. Although t...
In this thesis, we study the -wise independence of block ciphers following the Substitution-Permutat...
We continue the study of $t$-wise independence of substitution-permutation networks (SPNs) initiated...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit blo...
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a $wn$-bit (...
The current paper studies the probability of differential characteristics for an unkeyed (or with a ...
In this thesis, we study blockciphers, meaning that the encryption (and decryption) sends a block of...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
Block ciphers are an essential ingredient of modern cryptography. They are widely used as building ...
We introduce C, a practical provably secure block cipher with a slow key schedule. C is based on the...
This paper represents a developed cryptographic information protection algorithm based on an substit...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal ...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
Block ciphers probably figure in the list of the most important cryptographic primitives. Although t...
In this thesis, we study the -wise independence of block ciphers following the Substitution-Permutat...
We continue the study of $t$-wise independence of substitution-permutation networks (SPNs) initiated...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structur...
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit blo...
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a $wn$-bit (...
The current paper studies the probability of differential characteristics for an unkeyed (or with a ...
In this thesis, we study blockciphers, meaning that the encryption (and decryption) sends a block of...
This paper considers - for the first time - the concept of key alternating ciphers in a provable sec...
Block ciphers are an essential ingredient of modern cryptography. They are widely used as building ...
We introduce C, a practical provably secure block cipher with a slow key schedule. C is based on the...
This paper represents a developed cryptographic information protection algorithm based on an substit...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal ...
Recent advances in block-cipher theory deliver security analyses in models where one or more underly...
Block ciphers probably figure in the list of the most important cryptographic primitives. Although t...