Publicaties
Gekozen filters:
Gekozen filters:
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse KU Leuven
© International Association for Cryptologic Research 2015. We present a new, misuse-resistant scheme for online authenticated encryption, following the framework set forth by Fleischmann et al. (FSE 2012). Our scheme, COBRA, is roughly as efficient as the GCM mode of operation for nonce-based authenticated encryption, performing one block cipher call plus one finite field multiplication per message block in a parallelizable way. The major ...
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures KU Leuven
© Springer-Verlag Berlin Heidelberg 2013. In this paper we perform a comprehensive area, power, and energy analysis of some of the most recently-developed lightweight block ciphers and we compare them to the standard AES algorithm. We do this for several different architectures of the considered block ciphers. Our evaluation method consists of estimating the pre-layout power consumption and the derived energy using Cadence Encounter RTL Compiler ...
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher KU Leuven
The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers. In this paper we present several new related-key differential characteristics of MMB. These characteristics can be used to form several related-key boomerangs to attack the full MMB. Using 2 20 adaptive chosen plaintexts and ciphertexts we recover all key ...
On Side-Channel Resistant Block Cipher Usage KU Leuven
© 2011, Springer-Verlag Berlin Heidelberg. Based on re-keying techniques by Abdalla, Bellare, and Borst, we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type of adversary that can adaptively choose the leakage function as long as the leaked information is bounded. It turns out that our ...
Techniques for Block Cipher Cryptanalysis KU Leuven
The research interests of my PhD study are the analysis and design of symmetric-key primitives, especially block ciphers. Block ciphers are the basis of symmetric-key cryptography. During the last two decades, comprehensive insights on the analytic methods and the design criteria are developed. For cryptanalysts, a major question is to find good distinguishers, such as differential characteristics and linear trails. One of my main interests will ...
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms KU Leuven
© 2015 Science China Press and Springer-Verlag Berlin Heidelberg In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-network. The substitution layer consists of 16 4×4 S-boxes in parallel. The permutation layer is composed of 3 rotations. As shown in this paper, RECTANGLE offers great ...