Block Ciphers That Are Easier to Mask: How Far Can We Go?
From MaRDI portal
Publication:2851426
DOI10.1007/978-3-642-40349-1_22zbMath1353.94048OpenAlexW1611243483MaRDI QIDQ2851426
Vincent Grosso, María Naya-Plasencia, Benoît Gérard, François-Xavier Standaert
Publication date: 10 October 2013
Published in: Cryptographic Hardware and Embedded Systems - CHES 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40349-1_22
Related Items (36)
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties ⋮ Cryptanalysis of full LowMC and LowMC-M with algebraic techniques ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A new non-random property of 4.5-round PRINCE ⋮ On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure ⋮ Key recovery attacks on iterated Even-Mansour encryption schemes ⋮ Counting active S-boxes is not enough ⋮ Constructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parameters ⋮ Improved filter permutators for efficient FHE: better instances and implementations ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ A Higher Order Key Partitioning Attack with Application to LBlock ⋮ A further study on bridge structures and constructing bijective S-boxes for low-latency masking ⋮ A practical forgery attack on Lilliput-AE ⋮ Generalized MitM attacks on full TWINE ⋮ Secret can be public: low-memory AEAD mode for high-order masking ⋮ Provable security of HADES structure ⋮ \textsf{ISAP+}: \textsf{ISAP} with fast authentication ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам ⋮ Improving the security and efficiency of block ciphers based on LS-designs ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Perfect nonlinear functions and cryptography ⋮ Related-Key Attack on Full-Round PICARO ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ New classes of $8$-bit permutations based on a butterfly structure ⋮ Построение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функций ⋮ New slide attacks on almost self-similar ciphers ⋮ Mind the middle layer: the HADES design strategy revisited ⋮ Leakage resilient value comparison with application to message authentication ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
This page was built for publication: Block Ciphers That Are Easier to Mask: How Far Can We Go?