Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers

@inproceedings{Sun2014AutomaticSE,
  title={Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers},
  author={Siwei Sun and Lei Hu and Peng Wang and Kexin Qiao and Xiaoshuang Ma and Ling Song},
  booktitle={ASIACRYPT},
  year={2014}
}
We propose two systematic methods to describe the differential property of an S-box with linear inequalities based on logical condition modelling and computational geometry respectively. In one method, inequalities are generated according to some conditional differential properties of the S-box; in the other method, inequalities are extracted from the H-representation of the convex hull of all possible differential patterns of the S-box. For the second method, we develop a greedy algorithm for… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 155 citations. REVIEW CITATIONS
76 Citations
66 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 76 extracted citations

155 Citations

0204020142015201620172018
Citations per Year
Semantic Scholar estimates that this publication has 155 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 66 references

Gurobi optimizer reference manual

  • Optimization, Gurobi
  • http://www.gurobi.com
  • 2013
Highly Influential
9 Excerpts

Similar Papers

Loading similar papers…