Skip to main content
Log in

Improved nonlinear invariant attack

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Todo Y, Leander G, Sasaki Y. Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. In: Proceedings of Advances in Cryptology—ASIACRYPT 2016, Hanoi, 2016. 3–33

  2. Grosso V, Leurent G, Standaert F X, et al. LS-Designs: bitslice encryption for efficient masked software implementations. In: Fast Software Encryption. Berlin: Springer, 2014. 18–37

    MATH  Google Scholar 

  3. Beierle C, Canteaut A, Leander G, et al. Proving resistance against invariant attacks: how to choose the round constants. In: Proceedings of the 37th Annual International Cryptology Conference, Santa Barbara, 2017. 647–678

  4. Wei Y Z, Ye T, Wu W L, et al. Generalized nonlinear invariant attack and a new design criterion for round constants. IACR Trans Symmetric Cryptol, 2018, 4: 62–79

    Article  Google Scholar 

  5. Leander G, Poschmann A. On the classification of 4 bit S-boxes. In: Arithmetic of Finite Fields. Berlin: Springer, 2007. 159–176

    Chapter  Google Scholar 

  6. Zhang W T, Bao Z Z, Rijmen V, et al. A new classification of 4-bit optimal S-boxes and its application to PRESENT, RECTANGLE and SPONGENT. In: Proceedings of International Workshop on Fast Software Encryption, Istanbul, 2015. 494–515

  7. Bilgin B, Bogdanov A, Knezevic M, et al. Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. In: Proceedings of Cryptographic Hardware and Embedded Systems—CHES 2013. Berlin: Springer, 2013. 142–158

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61672530, 61702537, 61772545).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Li.

Supplementary File

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tong, H., Shen, X., Li, C. et al. Improved nonlinear invariant attack. Sci. China Inf. Sci. 65, 139103 (2022). https://doi.org/10.1007/s11432-019-2632-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2632-1

Navigation