Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Energy-optimized Symmetric Cryptography by Algebraic Duality Analysis

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

Differential and Linear properties of vectorial boolean functions based on chi (opens in new window)

Author(s): Silvia Mella, Alireza Mehrdad, Joan Daemen
Published in: Cryptography and Communications, Issue 15, 2024, Page(s) 1087-1116, ISSN 1936-2447
Publisher: Springer Pub. Co.,
DOI: 10.1007/s12095-023-00639-1

Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers (opens in new window)

Author(s): Aldo Gunsing, Joan Daemen, Bart Mennink
Published in: IACR Transactions on Symmetric Cryptography, Issue 2020(3), 2020, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.13154/tosc.v2020.i3.362-366

Pasta: A Case for Hybrid Homomorphic Encryption (opens in new window)

Author(s): Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2023(3), 2023, Page(s) 30-73, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2023.i3.30-73

An algebraic approach to symmetric linear layers in cryptographic primitives (opens in new window)

Author(s): Robert Christian Subroto
Published in: Cryptography and Communications, Issue 15, 2024, Page(s) 1053-1067, ISSN 1936-2447
Publisher: Springer Pub. Co.,
DOI: 10.1007/s12095-023-00630-w

Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: (opens in new window)

Author(s): Alireza Mehrdad, Silvia Mella, Lorenzo Grassi, Joan Daemen
Published in: IACR Transactions on Symmetric Cryptology, Issue 2022(2), 2022, Page(s) 253-288, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2022.i2.253-288

Tighter Trail Bounds for Xoodoo (opens in new window)

Author(s): Silvia Mella, Joan Daemen, Gilles Van Assche
Published in: IACR Transactions on Symmetric Cryptology, Issue 2023, 2023, Page(s) 187-214, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2023.i4.187-214

The state diagram of $$\chi $$ (opens in new window)

Author(s): Jan Schoone, Joan Daemen
Published in: Designs, Codes and Cryptography, Issue 92, 2024, Page(s) 1393-1421, ISSN 0925-1022
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10623-023-01349-8

Hardware-oriented optimization of Bloom filter algorithms and architectures for ultra-high-speed lookups in network applications (opens in new window)

Author(s): Arish Sateesan, Jo Vliegen, Joan Daemen, Nele Mentens
Published in: Microprocessors and Microsystems, Issue 93, 2024, Page(s) 104619, ISSN 0141-9331
Publisher: Elsevier BV
DOI: 10.1016/j.micpro.2022.104619

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp (opens in new window)

Author(s): Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger
Published in: IACR Transactions on Symmetric Cryptology, Issue 2022(1), 2022, Page(s) 5-37, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2022.i1.5-37

Propagation properties of a non-linear mapping based on squaring in odd characteristic (opens in new window)

Author(s): Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel
Published in: Cryptography and Communications, Issue 16, 2024, Page(s) 997-1011, ISSN 1936-2447
Publisher: Springer Pub. Co.,
DOI: 10.1007/s12095-024-00711-4

The Subterranean 2.0 Cipher Suite (opens in new window)

Author(s): Joan Daemen, Pedro Maat Costa Massolino, Alireza Mehrdad, Yann Rotella
Published in: IACR Transactions on Symmetric Cryptology (ToSC), Issue 2020(S1), 2020, Page(s) 262-294, ISSN 2519-173X
Publisher: IACR
DOI: 10.13154/tosc.v2020.is1.262-294

A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps (opens in new window)

Author(s): Anna Guinet, Georg Land, Ioan Gabriel Bucur, Tim Güneysu
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2024, 2023, Page(s) 27-50, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2024.i1.27-50

Algebraic properties of the maps $$\chi _n$$ (opens in new window)

Author(s): Jan Schoone, Joan Daemen
Published in: Designs, Codes and Cryptography, Issue 92, 2024, Page(s) 2341-2365, ISSN 0925-1022
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10623-024-01395-w

An algebraic approach to circulant column parity mixers (opens in new window)

Author(s): Robert Christian Subroto
Published in: Designs, Codes and Cryptography, Issue 2024, 2024, ISSN 0925-1022
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10623-024-01476-w

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions (opens in new window)

Author(s): Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2023(1), 2022, Page(s) 326-368, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2023.i1.326-368

Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96 (opens in new window)

Author(s): Christoph Dobraunig, Yann Rotella, Jan Schoone
Published in: IACR Transactions on Symmetric Cryptology,, Issue 2020(1), 2020, Page(s) 289-312, ISSN 2519-173X
Publisher: Ruhr Universität Bochum
DOI: 10.13154/tosc.v2020.i1.289-312

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model (opens in new window)

Author(s): Gunsing, A., Daemen, J., & Mennink, B.
Published in: IACR Transactions on Symmetric Cryptology, Issue 2019(4, 2020, Page(s) 1-22, ISSN 2519-173X
Publisher: Ruhr Universität Bochum
DOI: 10.13154/tosc.v2019.i4.1-22

The design of Xoodoo and Xoofff (opens in new window)

Author(s): Daemen, J., Hoffert, S., Van Assche, G., & Van Keer, R
Published in: IACR Transactions on Symmetric Cryptology, Issue 2018(4), 2018, Page(s) 1-38, ISSN 2519-173X
Publisher: Ruhr Universität Bochum
DOI: 10.13154/tosc.v2018.i4.1-38

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers (opens in new window)

Author(s): Daemen, J., Mennink, B., & Van Assche, G.
Published in: IACR Transactions on Symmetric Cryptology, Issue 2018(4), 2018, Page(s) 197-228, ISSN 2519-173X
Publisher: Ruhr Universität Bochum
DOI: 10.13154/tosc.v2018.i4.197-228

Protecting against Statistical Ineffective Fault Attacks (opens in new window)

Author(s): Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, Robert Primas
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), Issue 2020(3), 2020, Page(s) 508-543, ISSN 2569-2925
Publisher: IACR
DOI: 10.13154/tches.v2020.i3.508-543

Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp (opens in new window)

Author(s): Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi
Published in: IACR Transactions on Symmetric Cryptology, Issue 2022(3), 2022, Page(s) 20-72, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2022.i3.20-72

Improved Differential and Linear Trail Bounds for ASCON (opens in new window)

Author(s): Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen
Published in: IACR Transactions on Symmetric Cryptology, Issue 2022(4), 2022, Page(s) 145-178, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2022.i4.145-178

Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer (opens in new window)

Author(s): Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
Published in: IACR Transactions on Symmetric Cryptology, Issue 2021(2), 2021, Page(s) 314-352, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2021.i2.314-352

Xoodyak, a lightweight cryptographic scheme (opens in new window)

Author(s): Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Published in: Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Issue 2020(S1), 2020, Page(s) 60-87, ISSN 2519-173X
Publisher: IACR
DOI: 10.13154/tosc.v2020.is1.60-87

Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication (opens in new window)

Author(s): Koustabh Ghosh, Parisa Amiri Eliasi, Joan Daemen
Published in: IACR Transactions on Symmetric Cryptology, Issue 2023(3), 2023, Page(s) 1-24, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2023.i3.1-24

Influence of the Linear Layer on the Algebraic Degree in SP-Networks (opens in new window)

Author(s): Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
Published in: IACR Transactions on Symmetric Cryptology, Issue 2022(1), 2022, Page(s) 110-137, ISSN 2519-173X
Publisher: Ruhr University Bochum
DOI: 10.46586/tosc.v2022.i1.110-137

Koala: A Low-Latency Pseudorandom Function

Author(s): Parisa Amiri Eliasi, Yanis Belkheyar, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh, Gilles Van Assche
Published in: Accepted and presented at SAC 2024, Issue 2024, 2024
Publisher: Springer

Security of Truncated Permutation Without Initial Value (opens in new window)

Author(s): Lorenzo Grassi, Bart Mennink
Published in: Lecture Notes in Computer Science, Advances in Cryptology – ASIACRYPT 2022, Issue 2022, 2023, Page(s) 620-650
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-22966-4_21

Mystrium: Wide Block Encryption Efficient on Entry-Level Processors (opens in new window)

Author(s): Parisa Amiri Eliasi, Koustabh Ghosh, Joan Daemen
Published in: Lecture Notes in Computer Science, Security and Cryptography for Networks, Issue 2024, 2024, Page(s) 71-96
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-71073-5_4

Twin Column Parity Mixers and Gaston (opens in new window)

Author(s): Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim
Published in: Lecture Notes in Computer Science, Advances in Cryptology – CRYPTO 2023, Issue 2023, 2024, Page(s) 475-506
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-38548-3_16

Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields (opens in new window)

Author(s): Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters
Published in: Lecture Notes in Computer Science, Advances in Cryptology – EUROCRYPT 2021, Issue 2021, 2024, Page(s) 3-34
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-77886-6_1

Weak Subtweakeys in SKINNY (opens in new window)

Author(s): Daniël Kuijsters, Denise Verbakel, Joan Daemen
Published in: Lecture Notes in Computer Science, Progress in Cryptology – INDOCRYPT 2022, Issue 2022, 2024, Page(s) 336-348
Publisher: Springer International Publishing
DOI: 10.1007/978-3-031-22912-1_15

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC (opens in new window)

Author(s): Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
Published in: Lecture Notes in Computer Science, Advances in Cryptology – ASIACRYPT 2020, Issue 2020, 2024, Page(s) 477-506
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64837-4_16

Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift (opens in new window)

Author(s): Koustabh Ghosh, Parisa Amiri Eliasi, Joan Daemen
Published in: Lecture Notes in Computer Science, Progress in Cryptology – INDOCRYPT 2023, Issue 2023, 2024, Page(s) 3-24
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-56232-7_1

From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications (opens in new window)

Author(s): Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch
Published in: Lecture Notes in Computer Science, Advances in Cryptology – EUROCRYPT 2023, Issue 2023, 2023, Page(s) 255-286
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-30634-1_9

Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices (opens in new window)

Author(s): Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri Eliasi, Joan Daemen
Published in: Lecture Notes in Computer Science, Progress in Cryptology - AFRICACRYPT 2023, Issue 2023, 2023, Page(s) 129-150
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-37679-5_6

Algebraic Key-Recovery Attacks on Reduced-Round Xoofff (opens in new window)

Author(s): Tingting Cui, Lorenzo Grassi
Published in: Lecture Notes in Computer Science, Selected Areas in Cryptography, Issue 2020, 2021, Page(s) 171-197, ISBN 978-3-030-81652-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-81652-0_7

Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES (opens in new window)

Author(s): Lorenzo Grassi, Christian Rechberger
Published in: Lecture Notes in Computer Science, Information Security and Privacy, Issue 2022, 2022, Page(s) 24-45
Publisher: Springer International Publishing
DOI: 10.1007/978-3-031-22301-3_2

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection (opens in new window)

Author(s): Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I, Issue 12105, 2020, Page(s) 581-611, ISBN 978-3-030-45720-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45721-1_21

On the Security of Keyed Hashing Based on Public Permutations (opens in new window)

Author(s): Jonathan Fuchs, Yann Rotella, Joan Daemen
Published in: Lecture Notes in Computer Science, Advances in Cryptology – CRYPTO 2023, Issue 2023, 2024, Page(s) 607-627
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-38548-3_20

Thinking Outside the Superbox (opens in new window)

Author(s): Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche
Published in: Lecture Notes in Computer Science, Advances in Cryptology – CRYPTO 2021, Issue 2021, 2024, Page(s) 337-367
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-84252-9_12

Computing the Distribution of Differentials over the Non-linear Mapping $$\chi $$ (opens in new window)

Author(s): Joan Daemen, Alireza Mehrdad, Silvia Mella
Published in: Lecture Notes in Computer Science, Security, Privacy, and Applied Cryptography Engineering, Issue 2021, 2023, Page(s) 3-21
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-95085-9_1

Reinforced Concrete (opens in new window)

Author(s): Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
Published in: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Issue 2022, 2023
Publisher: ACM
DOI: 10.1145/3548606.3560686

Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology (opens in new window)

Author(s): Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens
Published in: Proceedings of the 19th ACM International Conference on Computing Frontiers, Issue 2022, 2023, Page(s) 258-262
Publisher: ACM
DOI: 10.1145/3528416.3530992

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0