Similarities between Encryption and Decryption: How far can we go?

Abstract : In this talk, I will investigate some approaches for reducing the hardware footprint of a block cipher for different constraints of the targeted applications. In this context, I will focus on the strategies which can be used for minimizing the overhead for decryption on top of encryption. These strategies include involutive ciphers and the construction used in PRINCE. In particular, I will discuss the potential weaknesses which might be introduced by this type of constructions.
Type de document :
Communication dans un congrès
Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada. Springer, 2013, LNCS
Liste complète des métadonnées

https://hal.inria.fr/hal-00858933
Contributeur : Anne Canteaut <>
Soumis le : vendredi 6 septembre 2013 - 11:38:23
Dernière modification le : mardi 17 avril 2018 - 11:31:15

Identifiants

  • HAL Id : hal-00858933, version 1

Collections

Citation

Anne Canteaut. Similarities between Encryption and Decryption: How far can we go?. Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada. Springer, 2013, LNCS. 〈hal-00858933〉

Partager

Métriques

Consultations de la notice

134