Search Results - "Rijmen, Vincent"
-
1
-
2
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches
Published in Journal of cryptology (01-04-2011)“…Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of…”
Get full text
Journal Article -
3
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
Published in Designs, codes, and cryptography (01-09-2021)“…Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in…”
Get full text
Journal Article -
4
Revisiting the Wrong-Key-Randomization Hypothesis
Published in Journal of cryptology (01-04-2020)“…Linear cryptanalysis is considered to be one of the strongest techniques in the cryptanalyst’s arsenal. In most cases, Matsui’s Algorithm 2 is used for the key…”
Get full text
Journal Article -
5
PPP/PPP-RTK Message Authentication
Published in Navigation (Washington) (01-01-2023)“…This paper analyzes candidate schemes for PPP/PPP-RTK (precise point positioning/real-time kinematic) data authentication. Asymmetric schemes are proposed…”
Get full text
Journal Article -
6
New Key-Recovery Attack on Reduced-Round AES
Published in IACR Transactions on Symmetric Cryptology (10-06-2022)“…A new fundamental 4-round property of AES, called the zero-difference property, was introduced by Rønjom, Bardeh and Helleseth at Asiacrypt 2017. Our work…”
Get full text
Journal Article -
7
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
Published in Designs, codes, and cryptography (2022)“…ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR. To evaluate the resistance of an ARX cipher against…”
Get full text
Journal Article -
8
Multidimensional Linear Cryptanalysis of Feistel Ciphers
Published in IACR Transactions on Symmetric Cryptology (08-12-2023)“…This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only. This…”
Get full text
Journal Article -
9
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
Published in Journal of cryptology (01-04-2015)“…We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by…”
Get full text
Journal Article -
10
The phantom of differential characteristics
Published in Designs, codes, and cryptography (01-11-2020)“…For differential cryptanalysis under the single-key model, the key schedules hardly need to be exploited in constructing the characteristics, which is based on…”
Get full text
Journal Article -
11
Rhythmic Keccak: SCA Security and Low Latency in HW
Published in IACR transactions on cryptographic hardware and embedded systems (01-02-2018)“…Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that…”
Get full text
Journal Article -
12
Probability distributions of correlation and differentials in block ciphers
Published in Journal of mathematical cryptology (01-08-2007)“…We study the probability distributions of difference propagation probabilities and input-output correlations for functions and block ciphers of given…”
Get full text
Journal Article -
13
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
Published in Science China. Information sciences (01-03-2018)“…With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing…”
Get full text
Journal Article -
14
Whirlwind: a new cryptographic hash function
Published in Designs, codes, and cryptography (01-08-2010)“…A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be…”
Get full text
Journal Article -
15
-
16
-
17
-
18
-
19
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Published in Designs, codes, and cryptography (01-03-2014)“…Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the security of block ciphers. This work introduces a novel…”
Get full text
Journal Article -
20