Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Block Ciphers That Are Easier to Mask: How Far Can We Go? - MaRDI portal

Block Ciphers That Are Easier to Mask: How Far Can We Go?

From MaRDI portal
Publication:2851426

DOI10.1007/978-3-642-40349-1_22zbMath1353.94048OpenAlexW1611243483MaRDI QIDQ2851426

Vincent Grosso, María Naya-Plasencia, Benoît Gérard, François-Xavier Standaert

Publication date: 10 October 2013

Published in: Cryptographic Hardware and Embedded Systems - CHES 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40349-1_22




Related Items (36)

Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesCryptanalysis of full LowMC and LowMC-M with algebraic techniques\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA new non-random property of 4.5-round PRINCEOn Reverse-Engineering S-Boxes with Hidden Design Criteria or StructureKey recovery attacks on iterated Even-Mansour encryption schemesCounting active S-boxes is not enoughConstructing $8$-bit permutations, $8$-bit involutions and $8$-bit orthomorphisms with almost optimal cryptographic parametersImproved filter permutators for efficient FHE: better instances and implementationsCUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskA Higher Order Key Partitioning Attack with Application to LBlockA further study on bridge structures and constructing bijective S-boxes for low-latency maskingA practical forgery attack on Lilliput-AEGeneralized MitM attacks on full TWINESecret can be public: low-memory AEAD mode for high-order maskingProvable security of HADES structure\textsf{ISAP+}: \textsf{ISAP} with fast authenticationA MAC Mode for Lightweight Block CiphersМаскирование ГОСТ 28147-89 для защиты от атак по побочным каналамImproving the security and efficiency of block ciphers based on LS-designsImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesPerfect nonlinear functions and cryptographyRelated-Key Attack on Full-Round PICAROCryptanalysis of Feistel Networks with Secret Round FunctionsConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresNew classes of $8$-bit permutations based on a butterfly structureПостроение подстановок пространства $V_{2m}$ с использованием $(2m,m)$-функцийNew slide attacks on almost self-similar ciphersMind the middle layer: the HADES design strategy revisitedLeakage resilient value comparison with application to message authenticationCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksMode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungleThe MALICIOUS framework: embedding backdoors into tweakable block ciphersOn a generalization of substitution-permutation networks: the HADES design strategy







This page was built for publication: Block Ciphers That Are Easier to Mask: How Far Can We Go?