The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both good cryptographic properties and a low implementation cost. Such S-Boxes are suitable building-blocks in many lightweight block ciphers since they may achieve a better security level than designs based directly on smaller S-Boxes. We focus on S-Boxes corresponding to three rounds of a balanced Feistel and of a balanced MISTY structure, and generalize the recent results by Li and Wang on the best differential uniformity and linearity offered by such a construction. Most notably, we prove that Feistel networks supersede MISTY networks for the construction of 8-bit permutations. Based on these results, we also provide a particular instantiation of an 8-b...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Lightweight cryptography is characterized by the need for low implementation cost, while still provi...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Abstract. The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both ...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
For a class of generalized Feistel block ciphers, an explicit recurrent formula for the minimum nu...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Lightweight cryptography is characterized by the need for low implementation cost, while still provi...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...
Abstract. The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both ...
Bit permutations are efficient linear functions often used for lightweight cipher designs. However, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
Obtaining compact, while cryptographically strong, S-boxes is a challenging task required for hardwa...
For a class of generalized Feistel block ciphers, an explicit recurrent formula for the minimum nu...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
peer reviewedThe Russian Federation's standardization agency has recently published a hash function ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
International audienceIn order to study the resistance of a block cipher against boomerang attacks, ...
Lightweight cryptography is characterized by the need for low implementation cost, while still provi...
Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box) ...