Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …

The simeck family of lightweight block ciphers

G Yang, B Zhu, V Suder, MD Aagaard… - International workshop on …, 2015 - Springer
Two lightweight block cipher families, Simon and Speck, have been proposed by
researchers from the NSA recently. In this paper, we introduce Simeck, a new family of …

On lightweight stream ciphers with shorter internal states

F Armknecht, V Mikhalev - … Workshop, FSE 2015, Istanbul, Turkey, March 8 …, 2015 - Springer
To be resistant against certain time-memory-data-tradeoff (TMDTO) attacks, a common rule
of thumb says that the internal state size of a stream cipher should be at least twice the …

Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48

MA Abdelraheem, J Alizadeh, HA Alkhzaimi… - Progress in Cryptology …, 2015 - Springer
In this paper we analyse two variants of SIMON family of light-weight block ciphers against
variants of linear cryptanalysis and present the best linear cryptanalytic results on these …

[HTML][HTML] A new linearization method for nonlinear feedback shift registers

J Zhong, D Lin - Journal of Computer and System Sciences, 2015 - Elsevier
Nonlinear feedback shift registers (NFSRs) have been used as the main building blocks in
many stream ciphers and convolutional decoders. The linearization of NFSRs is to find their …

Automated dynamic cube attack on block ciphers: Cryptanalysis of SIMON and KATAN

Z Ahmadian, S Rasoolzadeh… - Cryptology ePrint …, 2015 - eprint.iacr.org
A few work has ever been performed in cryptanalysis of block ciphers using cube attacks.
This paper presents a new framework for an efficient key recovery attack on block ciphers …

TriviA: A fast and secure authenticated encryption scheme

A Chakraborti, A Chattopadhyay, M Hassan… - … and Embedded Systems, 2015 - Springer
In this paper, we propose a new hardware friendly authenticated encryption (AE) scheme
TriviA based on (i) a stream cipher for generating keys for the ciphertext and the tag, and (ii) …

[PDF][PDF] Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map

M Almazrooie, A Samsudin… - Journal of Information …, 2015 - koreascience.kr
The stream cipher Salsa20 and its reduced versions are among the fastest stream ciphers
available today. However, Salsa20/7 is broken and Salsa20/12 is not as safe as before …

Searching cubes for testing Boolean functions and its application to Trivium

M Liu, D Lin, W Wang - 2015 IEEE International Symposium on …, 2015 - ieeexplore.ieee.org
In this paper, we describe a sub-maximal degree monomial test and propose a heuristic
algorithm for searching favourable cubes, for testing Boolean functions formed by stream …

A related-key chosen-IV distinguishing attack on full Sprout stream cipher

Y Hao - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Sprout is a new lightweight stream cipher proposed at FSE 2015. According to its designers,
Sprout can resist time-memory-data trade-off (TMDTO) attacks with small internal state size …