Sciweavers

IACR
2016
40views Biometrics» more  IACR 2016»
8 years 1 months ago
On Linear Hulls and Trails in Simon
The block cipher Simon has a very simple round function. This simplicity allows us to compute the correlation matrix of the round function. Despite its simplicity, Simon exhibits s...
Tomer Ashur, Vincent Rijmen
IACR
2016
45views Biometrics» more  IACR 2016»
8 years 1 months ago
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
The Russian Federation’s standardization agency has recently published a hash function called Streebog and a 128-bit block cipher called Kuznyechik. Both of these algorithms use ...
Alex Biryukov, Léo Perrin, Aleksei Udovenko
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 1 months ago
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
There are many kinds of attacks that can be mounted on block ciphers: differential attacks, impossible differential attacks, truncated differential attacks, boomerang attacks. W...
Emmanuel Volte, Valérie Nachef, Nicolas Mar...
IACR
2016
32views Biometrics» more  IACR 2016»
8 years 1 months ago
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
We introduce a new technique for tight security proofs called work factor partitioning. Using this technique in a modified version of the framework of D¨ottling and Schr¨oder (C...
Tibor Jager
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 1 months ago
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
—Modular multiplication is the fundamental and compute-intense operation in many Public-Key crypto-systems. This paper presents two modular multipliers with their efficient arch...
Khalid Javeed, Xiaojun Wang
IACR
2016
45views Biometrics» more  IACR 2016»
8 years 1 months ago
Universal Composition with Responsive Environments
In universal composability frameworks, adversaries (or environments) and protocols/ideal functionalities often have to exchange meta-information on the network interface, such as a...
Jan Camenisch, Robert R. Enderlein, Stephan Krenn,...
IACR
2016
52views Biometrics» more  IACR 2016»
8 years 1 months ago
How Fast Can Higher-Order Masking Be in Software?
It is widely accepted that higher-order masking is a sound countermeasure to protect implementations of block ciphers against side-channel attacks. The main issue while designing s...
Dahmun Goudarzi, Matthieu Rivain
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 1 months ago
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire en...
Pascal Sasdrich, Amir Moradi, Tim Güneysu
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 1 months ago
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
The security of many cryptographic schemes has been based on special instances of the Learning with Errors (LWE) problem, e.g., Ring-LWE, LWE with binary secret, or LWE with ternar...
Johannes A. Buchmann, Florian Göpfert, Rachel...