Zobrazeno 1 - 10
of 152
pro vyhledávání: '"Gregor Leander"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
About 20 years ago, Wagner showed that most of the (then) known techniques used in the cryptanalysis of block ciphers were particular cases of what he called commutative diagram cryptanalysis. However, to the best of our knowledge, this general frame
Externí odkaz:
https://doaj.org/article/22abda218f3c42f0ae57eae137e7e7db
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establishment (ALE) messages in high frequency radio, a technology commonly used by the military, other government agencies and industries which require high
Externí odkaz:
https://doaj.org/article/6c5b32769ff94426a1fe9df13b51bf05
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 4 (2022)
There are many recent results on reverse-engineering (potentially hidden) structure in cryptographic S-boxes. The problem of recovering structure in the other main building block of symmetric cryptographic primitives, namely, the linear layer, has no
Externí odkaz:
https://doaj.org/article/fc080cfd8403400f99c22181718f7b8f
Publikováno v:
Frontiers in Physics, Vol 10 (2022)
Even-Mansour is one of the most important constructions in symmetric cryptography, both from a theoretical and practical perspective. With the rapid development of quantum computing, the security of Even-Mansour construction in quantum setting needs
Externí odkaz:
https://doaj.org/article/4fd3cf18b0c247dfbff4986fb1df9a0a
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 3 (2022)
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications. We p
Externí odkaz:
https://doaj.org/article/beef45b6cd4249df92b86adb28d456bb
Autor:
Gregor Leander, Shahram Rasoolzadeh
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 1 (2022)
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks. In this paper, we present an equivalent description of C
Externí odkaz:
https://doaj.org/article/afb10afe62af4d74a953186685848db7
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware. The center
Externí odkaz:
https://doaj.org/article/60df73606be14960bdf0f1b7b706b307
Autor:
Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander, Léo Perrin, François-Xavier Standaert
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 1 (2021)
In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated to offshore contract foundries, making them exposed to malicious modifications, known as hardware Trojans. Recent works have demonstrated that a strong fo
Externí odkaz:
https://doaj.org/article/ac26dfa20a694eaabf94b87f02b1c4db
Autor:
Phil Hebborn, Gregor Leander
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 3 (2020)
Progress in the areas of multi-party computation (MPC) and fully homomorphic encryption (FHE) caused the demand of new design strategies, that minimize the number of multiplications in symmetric primitives. Rasta is an approach for a family of stream
Externí odkaz:
https://doaj.org/article/edece6a0ffbf4c8dbbb9762cda32106e
Autor:
Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert, Balazs Udvarhelyi, Friedrich Wiemer
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakageresistant mod
Externí odkaz:
https://doaj.org/article/6ccc6ff93c074f8180c6ef6c98574633