• A Bit-Vector Differential Model for the Modular Addition by a Constant 

      Azimi, Seyyed Arash; Ranea, Adrián; Salmasizadeh, Mahmoud; Mohajeri, Javad; Aref, Mohammad Reza; Rijmen, Vincent Stefaan (Journal article; Peer reviewed, 2020)
      ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR, which achieve the best software performances in low-end microcontrollers. To evaluate the resistance of an ARX cipher against ...
    • Guarding the First Order: The Rise of AES Maskings 

      Askeland, Amund; Dhooghe, S.; Petkova-Nikova, Svetla Iordanova; Rijmen, Vincent Stefaan; Zhang, Zhenda (Journal article; Peer reviewed, 2023)
      We provide three first-order hardware maskings of the AES, each allowing for a different trade-off between the number of shares and the number of register stages. All maskings use a generalization of the changing of the ...
    • Multidimensional Linear Cryptanalysis of Feistel Ciphers 

      Özdemir, Betül Aşkın; Beyne, Tim; Rijmen, Vincent Stefaan (Journal article; Peer reviewed, 2023)
      This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only. This feature leads to a specific vulnerability that can be exploited using ...
    • New Key-Recovery Attack on Reduced-Round AES 

      Bardeh, Navid Ghaedi; Rijmen, Vincent Stefaan (Journal article; Peer reviewed, 2022)
      A new fundamental 4-round property of AES, called the zero-difference property, was introduced by Rønjom, Bardeh and Helleseth at Asiacrypt 2017. Our work characterizes it in a simple way by exploiting the notion of related ...
    • An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes 

      Piccione, Enrico; Andreoli, Samuele; Budaghyan, Lilya; Carlet, Claude Michael; Dhooghe, Siemen; Nikova, Svetla; Petrides, George; Rijmen, Vincent Stefaan (Journal article; Peer reviewed, 2023)
      Threshold implementation is a method based on secret sharing to secure cryptographic ciphers (and in particular S-boxes) against differential power analysis side-channel attacks which was proposed by Nikova, Rechberger, ...
    • PPP/PPP-RTK Message Authentication 

      Fernandez-Hernandez, Ignacio; Hirokawa, Rui; Rijmen, Vincent Stefaan; Aikawa, Yusuke (Journal article; Peer reviewed, 2023)
      This paper analyzes candidate schemes for PPP/PPP-RTK (precise point positioning/real-time kinematic) data authentication. Asymmetric schemes are proposed based on existing standards and compatible with GNSS messages. ...
    • Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK 

      Sadeghi, Sadegh; Rijmen, Vincent Stefaan; Bagheri, Nasour (Journal article; Peer reviewed, 2021)
      Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in symmetric-key ciphers. In this paper, we develop an MILP-based ...