Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

On a generalization of substitution-permutation networks: The HADES design strategy

L Grassi, R Lüftenegger, C Rechberger… - Advances in Cryptology …, 2020 - Springer
Keyed and unkeyed cryptographic permutations often iterate simple round functions.
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …

WARP: Revisiting GFN for lightweight 128-bit block cipher

S Banik, Z Bao, T Isobe, H Kubo, F Liu… - Selected Areas in …, 2021 - Springer
In this article, we present WARP, a lightweight 128-bit block cipher with a 128-bit key. It aims
at small-footprint circuit in the field of 128-bit block ciphers, possibly for a unified encryption …

IVLBC: An involutive lightweight block cipher for Internet of Things

X Huang, L Li, J Yang - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Nowadays, the use of the Internet of Things has reached a commanding height in a new
round of economic and technological upsurge. Its data transmission security has attracted …

Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher

D Bellizia, F Berti, O Bronchain, G Cassiers… - IACR Transactions on …, 2020 - inria.hal.science
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …

PEIGEN–a platform for evaluation, implementation, and generation of S-boxes

Y Sasaki, S Ling, J Guo, Z Bao - 2019 - dr.ntu.edu.sg
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient
software/hardware implementations, and generate cryptographic S-boxes. Continuously …

Block cipher invariants as eigenvectors of correlation matrices

T Beyne - Journal of Cryptology, 2020 - Springer
A new approach to invariant subspaces and nonlinear invariants is developed. This results
in both theoretical insights and practical attacks on block ciphers. It is shown that, with minor …

Bipbip: A low-latency tweakable block cipher with small dimensions

Y Belkheyar, J Daemen, C Dobraunig… - IACR Transactions on …, 2023 - tches.iacr.org
Recently, a memory safety concept called Cryptographic Capability Computing (C 3) has
been proposed. C 3 is the first memory safety mechanism that works without requiring extra …

Skinny-aead and skinny-hash

C Beierle, J Jean, S Kölbl, G Leander… - IACR Transactions on …, 2020 - tosc.iacr.org
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of
hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family …