Similarities between Encryption and Decryption: How far can we go?

Abstract : In this talk, I will investigate some approaches for reducing the hardware footprint of a block cipher for different constraints of the targeted applications. In this context, I will focus on the strategies which can be used for minimizing the overhead for decryption on top of encryption. These strategies include involutive ciphers and the construction used in PRINCE. In particular, I will discuss the potential weaknesses which might be introduced by this type of constructions.
Document type :
Conference papers
Complete list of metadatas

https://hal.inria.fr/hal-00858933
Contributor : Anne Canteaut <>
Submitted on : Friday, September 6, 2013 - 11:38:23 AM
Last modification on : Friday, May 25, 2018 - 12:02:05 PM

Identifiers

  • HAL Id : hal-00858933, version 1

Collections

Citation

Anne Canteaut. Similarities between Encryption and Decryption: How far can we go?. Selected Areas in Cryptography - SAC 2013, Aug 2013, Vancouver, Canada. ⟨hal-00858933⟩

Share

Metrics

Record views

176