Mix-Basis Geometric Approach to Boomerang Distinguishers
Differential cryptanalysis relies on assumptions like Markov ciphers and hypothesis of stochastic equivalence. The probability of a differential characteristic estimated by classical methods is the key-averaged probability under the two assumptions ...
Chengcheng Chang +4 more
doaj +1 more source
A Fast Search Method for 3‐Share Second‐Order Masking Schemes for Lightweight S‐Boxes
Masking schemes are widely adopted strategies for countering side‐channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of shares required for a TI scheme depends not only on the desired security order but also on the ...
Yanhong Fan +4 more
wiley +1 more source
Principal component analysis in power analysis [PDF]
Tato práce se zabývá využitím analýzy hlavních komponent v kryptoanalýze proudovým postranním kanálem. Nejdříve je v práci rozebrána problematika kryptoanalýzy, kryp- toanalýzy proudovým postranním kanálem, metody analýzy hlavních komponent a in ...
Jedlička, František
core
Differential experiments using parallel alternative operations
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco +2 more
doaj +1 more source
Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj +1 more source
Further Results of the Cryptographic Properties on the Butterfly Structures
Recently, a new structure called butterfly introduced by Perrin et at. is attractive for that it has very good cryptographic properties: the differential uniformity is at most equal to 4 and algebraic degree is also very high when exponent $e=3$.
Feng, Xiutao, Fu, Shihui
core +1 more source
Multiple Differential Cryptanalysis: Theory and Practice [PDF]
Differential cryptanalysis is a well-known statistical attack on block ciphers. We present here a generalisation of this attack called multiple differential cryptanalysis. We study the data complexity, the time complexity and the success probability of such an attack and we experimentally validate our formulas on a reduced version of PRESENT.
Blondeau, Céline, Gérard, Benoît
openaire +3 more sources
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
Azimi SA +5 more
europepmc +1 more source
Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations
This work presents an exact and compact formula for the probability of rotation-xor differentials (RX-differentials) through modular addition, for arbitrary rotation amounts, which has been a long-standing open problem. The formula comes with a rigorous
Alex Biryukov +2 more
doaj +1 more source
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core

