Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
From MaRDI portal
Publication:1726672
DOI10.1007/978-3-030-10970-7_8zbMath1447.94017OpenAlexW2910049226MaRDI QIDQ1726672
Publication date: 20 February 2019
Full work available at URL: https://orbit.dtu.dk/en/publications/00ce3602-da74-4c80-8da3-b9c82e561a9a
rectangledifferential cryptanalysispresentlightweight cryptographyprincesymmetric-key cryptographyskinnymidoriiotlblockSAT/SMT solverSimonsparxspecktwine
Related Items (8)
An STP-based model toward designing S-boxes with good cryptographic properties ⋮ Automatic tool for searching for differential characteristics in ARX ciphers and applications ⋮ An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros ⋮ Clustering effect of iterative differential and linear trails ⋮ Generic framework for key-guessing improvements ⋮ Differential cryptanalysis in the fixed-key model ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Integral characteristics by keyspace partitioning
Cites Work
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of PRESENT-like cipher
- Differential cryptanalysis of round-reduced \textsc{Sparx}-64/128
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- Midori: A Block Cipher for Low Energy
- Improved Impossible Differential Attack on Reduced-Round LBlock
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- On the Distribution of Linear Biases: Three Instructive Examples
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Analysis of NORX: Investigating Differential and Rotational Properties
- Differential Cryptanalysis of Round-Reduced Simon and Speck
- Differential Analysis of Block Ciphers SIMON and SPECK
- Multiple Differential Cryptanalysis of Round-Reduced PRINCE
- Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Nonlinear Invariant Attack
- Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Related-Key Cryptanalysis of Midori
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Observations on the SIMON Block Cipher Family
- PRESENT: An Ultra-Lightweight Block Cipher
- Markov Ciphers and Differential Cryptanalysis
- The Wide Trail Design Strategy
- Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited
- A Brief Comparison of Simon and Simeck
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- A Model for Structure Attacks, with Applications to PRESENT and Serpent
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Analysis of Differential Attacks in ARX Constructions
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Automatic Search for Differential Trails in ARX Ciphers
- A machine program for theorem-proving
This page was built for publication: Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis