Zobrazeno 1 - 10
of 110
pro vyhledávání: '"Thomas Peyrin"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as
Externí odkaz:
https://doaj.org/article/c87b32ccd30a4206882b3d23f3b9c895
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 2 (2023)
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a
Externí odkaz:
https://doaj.org/article/10c4b21bf2e84678aa734362f76e6f37
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
Deep neural networks (DNN) have become a significant threat to the security of cryptographic implementations with regards to side-channel analysis (SCA), as they automatically combine the leakages without any preprocessing needed, leading to a more e
Externí odkaz:
https://doaj.org/article/c60a9353426d40edbcd41ac0cc7680ff
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 4 (2022)
Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers. Concerning symmetric-key operating modes
Externí odkaz:
https://doaj.org/article/8b95226507fe4eb98f3fdfb8437758d7
Autor:
Thomas Peyrin, Quan Quan Tan
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 4 (2022)
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remains unclear how the subkey values and more generally the Markov assumption impacts exactly their probability estimation. There were theoretical efforts
Externí odkaz:
https://doaj.org/article/8d57c72e16d54c6da98e5cf8b3ad28dc
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 3 (2021)
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods w
Externí odkaz:
https://doaj.org/article/a4fbcaf5f0f6458cb12c146a07996513
Autor:
Alexandre Adomnicai, Thomas Peyrin
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 1 (2020)
The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations. In this article, we show that the fundamental idea
Externí odkaz:
https://doaj.org/article/a1a5067cd9104de39712eb2c83552f48
Autor:
Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process. Pyjamask targets side-channel resistance as one of its main goal. More precisely,
Externí odkaz:
https://doaj.org/article/9eed4702b5994a3fb5deaa4a5fee3fed
Autor:
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underl
Externí odkaz:
https://doaj.org/article/70c29ec3f4f24e6dac16a54472b4ee05
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
The GIFT family of lightweight block ciphers, published at CHES 2017, offers excellent hardware performance figures and has been used, in full or in part, in several candidates of the ongoing NIST lightweight cryptography competition. However, implem
Externí odkaz:
https://doaj.org/article/cd209109d720446b9d23ffe9723a65c1