Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Pitfalls and Shortcomings for Decompositions and Alignment

    In this paper we, for the first time, study the question under which circumstances decomposing a round function of a Substitution-Permutation Network is possible uniquely. More precisely, we provide necessary and...

    Baptiste Lambin, Gregor Leander, Patrick Neumann in Advances in Cryptology – EUROCRYPT 2023 (2023)

  2. No Access

    Chapter and Conference Paper

    PRINCEv2

    In this work, we propose tweaks to the PRINCE block cipher that help us to increase its security without changing the number of rounds or round operations. We get substantially higher security for the same comple...

    Dušan Božilov, Maria Eichlseder, Miroslav Knežević in Selected Areas in Cryptography (2021)

  3. No Access

    Chapter and Conference Paper

    Strong and Tight Security Guarantees Against Integral Distinguishers

    Integral attacks belong to the classical attack vectors against any given block ciphers. However, providing arguments that a given cipher is resistant against those attacks is notoriously difficult. In this p...

    Phil Hebborn, Baptiste Lambin, Gregor Leander in Advances in Cryptology – ASIACRYPT 2021 (2021)

  4. Article

    Open Access

    Linearly equivalent S-boxes and the division property

    Division property is a cryptanalysis method that proves to be very efficient on block ciphers. Computer-aided techniques such as MILP have been widely and successfully used to study various cryptanalysis techn...

    Baptiste Lambin, Patrick Derbez, Pierre-Alain Fouque in Designs, Codes and Cryptography (2020)

  5. Chapter and Conference Paper

    Lower Bounds on the Degree of Block Ciphers

    Only the method to estimate the upper bound of the algebraic degree on block ciphers is known so far, but it is not useful for the designer to guarantee the security. In this paper we provide meaningful lower...

    Phil Hebborn, Baptiste Lambin, Gregor Leander in Advances in Cryptology – ASIACRYPT 2020 (2020)

  6. Chapter and Conference Paper

    Variants of the AES Key Schedule for Better Truncated Differential Bounds

    Differential attacks are one of the main ways to attack block ciphers. Hence, we need to evaluate the security of a given block cipher against these attacks. One way to do so is to determine the minimal number...

    Patrick Derbez, Pierre-Alain Fouque in Selected Areas in Cryptography – SAC 2018 (2019)