Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Virginie Lallemand"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses. In Lu’s work, the considered im
Externí odkaz:
https://doaj.org/article/6da41e6ecf6a474c992c9ffcf6feefba
Autor:
Xavier Bonnetain, Virginie Lallemand
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 3 (2023)
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers. Several important advances have been made on this matter, wit
Externí odkaz:
https://doaj.org/article/cf07d46947e24e038d6fe92264f528ca
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 2 (2022)
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations. We start by looking for boomerang characteristics that directly take into account the boomerang sw
Externí odkaz:
https://doaj.org/article/74203b9d029c4fcda1ba8fd7ae434921
Autor:
Benoît Cogliati, Jordan Ethan, Virginie Lallemand, Byeonghak Lee, Jooyoung Lee, Marine Minier
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 4 (2021)
In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using a single secret S-box. This construction is based on non-linear permutation layers using independent round keys, and achieves security beyond the birt
Externí odkaz:
https://doaj.org/article/2edadb90ee6c48bebdfd14200ff2bf8d
Autor:
Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander, Léo Perrin, François-Xavier Standaert
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 1 (2021)
In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated to offshore contract foundries, making them exposed to malicious modifications, known as hardware Trojans. Recent works have demonstrated that a strong fo
Externí odkaz:
https://doaj.org/article/ac26dfa20a694eaabf94b87f02b1c4db
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following wor
Externí odkaz:
https://doaj.org/article/65a5a4d3bf0f4d0b85494bb1f10b9a42
Autor:
Sebastian Faust, Gregor Leander, François-Xavier Standaert, Léo Perrin, Virginie Lallemand, Olivier Bronchain
Publikováno v:
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, 2021, 2021 (1), pp.78-129. ⟨10.46586/tosc.v2021.i1.78-129⟩
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2021, 2021 (1), pp.78-129. ⟨10.46586/tosc.v2021.i1.78-129⟩
IACR Transactions on Symmetric Cryptology, no.1, p. 78-129 (2021)
IACR Transactions on Symmetric Cryptology; Volume 2021, Issue 1; 78-129
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 1 (2021)
IACR Transactions on Symmetric Cryptology, 2021, 2021 (1), pp.78-129. ⟨10.46586/tosc.v2021.i1.78-129⟩
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2021, 2021 (1), pp.78-129. ⟨10.46586/tosc.v2021.i1.78-129⟩
IACR Transactions on Symmetric Cryptology, no.1, p. 78-129 (2021)
IACR Transactions on Symmetric Cryptology; Volume 2021, Issue 1; 78-129
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 1 (2021)
International audience; In order to lower costs, the fabrication of Integrated Circuits (ICs) is increasingly delegated to offshore contract foundries, making them exposed to malicious modifications, known as hardware Trojans. Recent works have demon
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::235f3cc363ecdc543abe938eb5ecf86c
https://inria.hal.science/hal-03453550
https://inria.hal.science/hal-03453550
Publikováno v:
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 1; 331-362
IACR Transactions on Symmetric Cryptology, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, 2020 (1), pp.331-362. ⟨10.13154/tosc.v2020.i1.331-362⟩
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 1; 331-362
International audience; At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new tab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b0ab4f347b125662ded2405f3ab8a0f4
https://inria.hal.science/hal-02945065/document
https://inria.hal.science/hal-02945065/document
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
BASE-Bielefeld Academic Search Engine
SAC 2019-Selected Areas in Cryptography
SAC 2019-Selected Areas in Cryptography, Aug 2019, Waterloo, Canada
SAC
BASE-Bielefeld Academic Search Engine
SAC 2019-Selected Areas in Cryptography
SAC 2019-Selected Areas in Cryptography, Aug 2019, Waterloo, Canada
In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous editions, the focus was made on practical att
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::363db6eee96afe1bd34f33a334f765c8
https://doi.org/10.1007/978-3-030-38471-5_6
https://doi.org/10.1007/978-3-030-38471-5_6
Autor:
Reza Reyhanitabar, Antoon Purnal, Elena Andreeva, Arnab Roy, Virginie Lallemand, Damian Vizár
Publikováno v:
ASIACRYPT 2019-25th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2019-25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2019, Kobe, Japan. pp.153-182, ⟨10.1007/978-3-030-34621-8_6⟩
Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
ASIACRYPT 2019-25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2019, Kobe, Japan. pp.153-182, ⟨10.1007/978-3-030-34621-8_6⟩
Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
Highly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios such as the CAN FD in automotive systems (max. message size 64 bytes), massive IoT, critical communication dom
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5947de08c9027c84428a0c2189a1909c
https://hal.inria.fr/hal-02388234/file/2019-1004_.pdf
https://hal.inria.fr/hal-02388234/file/2019-1004_.pdf