Block Ciphers – Focus on the Linear Layer (feat. PRIDE)

MR Albrecht, B Driessen, EB Kavun, G Leander… - Advances in Cryptology …, 2014 - Springer
The linear layer is a core component in any substitution-permutation network block cipher.
Its design significantly influences both the security and the efficiency of the resulting block …

[SÁCH][B] The block cipher companion

LR Knudsen, M Robshaw - 2011 - books.google.com
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the
action of a secret key, and the process of encryption is reversed by decryption which uses …

Cryptanalysis of a white box AES implementation

O Billet, H Gilbert, C Ech-Chatbi - International workshop on selected …, 2004 - Springer
The white box attack context as described in [1, 2] is the common setting where
cryptographic software is executed in an untrusted environment—ie an attacker has gained …

Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

On the classification of 4 bit s-boxes

G Leander, A Poschmann - Arithmetic of Finite Fields: First International …, 2007 - Springer
In this paper we classify all optimal 4 bit S-boxes. Remarkably, up to affine equivalence,
there are only 16 different optimal S-boxes. This observation can be used to efficiently …

Lightweight AEAD and hashing using the sparkle permutation family

C Beierle, A Biryukov, LC dos Santos… - IACR Transactions …, 2020 - research.ed.ac.uk
We introduce the Sparkle family of permutations operating on 256, 384 and 512 bits. These
are combined with the Beetle mode to construct a family of authenticated ciphers …

Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key

A Biryukov, C Bouillaguet, D Khovratovich - International conference on …, 2014 - Springer
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the …

Protecting white-box AES with dual ciphers

M Karroumi - International conference on information security and …, 2010 - Springer
In order to protect AES software running on untrusted platforms, Chow et al.(2002) designed
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …

[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family

C Beierle, A Biryukov, LC dos Santos, J Großschädl… - NIST round, 2019 - lab.las3.de
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …

Cryptanalysis of the **ao–Lai white-box AES implementation

Y De Mulder, P Roelse, B Preneel - … , Windsor, ON, Canada, August 15-16 …, 2013 - Springer
In the white-box attack context, ie, the setting where an implementation of a cryptographic
algorithm is executed on an untrusted platform, the adversary has full access to the …