Category: Cryptography
Home Research
Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice
Poster: Systematic Evaluation of Automated Tools for Side-Channel Vulnerability Detection in Cryptographic Libraries
Cryptography

To protect cryptographic implementations from side-channel vulnerabilities, developers must adopt constant-time programming practices. As...

Review:

This poster addresses a critical gap in the field of cryptographic security: the persistent presence of side-channel vulnerabilities despite the avail...

View Full Research
Fırat Artuğer, Songül Karakuş, Fatih Özkaynak
Comparison of Nonlinearity Value of Substitution Box Generation Approaches
Cryptography

Substitution box (s-box) is one of the important structures that perform the mixing process for encryption algorithms. Therefore, strong s-box structu...

Review:

This study addresses a crucial aspect of symmetric-key cryptography by focusing on the generation and evaluation of Substitution boxes (S-boxes), whic...

View Full Research
Kazuma Taka, Kosei Sakamoto, Ryoma Ito, Rentaro Shiba, Shion Utsumi, Takanori Isobe
Divide-and-Conquer SAT for Exploring Optimal Differential and Linear Characteristics and Its Applications
Cryptography

Developing automatic search tools to derive optimal characteristics is crucial for both the design and cryptanalysis of symmetric-key primi...

Review:

The paper, "Divide-and-Conquer SAT for Exploring Optimal Differential and Linear Characteristics and Its Applications," introduces a significant advan...

View Full Research
Thomas Peyrin, Quan Quan Tan, Hongyi Zhang, Chunning Zhou
Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers
Cryptography

Differential cryptanalysis is a powerful technique for attacking block ciphers, wherein the Markov cipher assumption and stochastic hypothe...

Review:

This paper introduces Trail-Estimator, an innovative automated verifier designed to address critical limitations in differential cryptanalysis. The au...

View Full Research