2019
DOI: 10.3390/cryptography3010004
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

Abstract: In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis. We have analyzed Fantomas and Robin with a technique that previously has not been applied to both algorithms or linear cryptanalysis. The idea behind linear cryptanalysis is to build a linear characteristic that describes the relation between plaintext and ciphertext bits. Such a relationship should hold with probability 0… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…It is worth noting here that the constraint of interference becomes a form of summation of simple variables. Thus, the SPI encryption method of interference quantization can be introduced to simplify the original data encryption interference problem [21][22][23][24][25][26].…”
Section: Security Encryption Methods Of Upimentioning
confidence: 99%
“…It is worth noting here that the constraint of interference becomes a form of summation of simple variables. Thus, the SPI encryption method of interference quantization can be introduced to simplify the original data encryption interference problem [21][22][23][24][25][26].…”
Section: Security Encryption Methods Of Upimentioning
confidence: 99%
“…Lightweight security features: There are no security features embedded into the ABCanDroid Framework, but in the future a cryptographic security algorithm can be implemented to provide data privacy. Lightweight encryption techniques could be implemented for secure image encryption for the healthcare industry [ 44 , 45 , 46 , 47 , 48 ].…”
Section: Future Workmentioning
confidence: 99%
“…Therefore, very lightweight encryption schemes are needed. Several encryption schemes [ 33 , 34 , 35 , 36 , 37 ] were presented in cryptography competitions for encryption algorithms [ 38 , 39 ]. With the growing number of resource-constrained devices in IoT, it becomes challenging to choose the encryption scheme based on system requirements.…”
Section: Our Systemmentioning
confidence: 99%