References
Todo Y, Leander G, Sasaki Y. Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. In: Proceedings of Advances in Cryptology—ASIACRYPT 2016, Hanoi, 2016. 3–33
Grosso V, Leurent G, Standaert F X, et al. LS-Designs: bitslice encryption for efficient masked software implementations. In: Fast Software Encryption. Berlin: Springer, 2014. 18–37
Beierle C, Canteaut A, Leander G, et al. Proving resistance against invariant attacks: how to choose the round constants. In: Proceedings of the 37th Annual International Cryptology Conference, Santa Barbara, 2017. 647–678
Wei Y Z, Ye T, Wu W L, et al. Generalized nonlinear invariant attack and a new design criterion for round constants. IACR Trans Symmetric Cryptol, 2018, 4: 62–79
Leander G, Poschmann A. On the classification of 4 bit S-boxes. In: Arithmetic of Finite Fields. Berlin: Springer, 2007. 159–176
Zhang W T, Bao Z Z, Rijmen V, et al. A new classification of 4-bit optimal S-boxes and its application to PRESENT, RECTANGLE and SPONGENT. In: Proceedings of International Workshop on Fast Software Encryption, Istanbul, 2015. 494–515
Bilgin B, Bogdanov A, Knezevic M, et al. Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. In: Proceedings of Cryptographic Hardware and Embedded Systems—CHES 2013. Berlin: Springer, 2013. 142–158
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61672530, 61702537, 61772545).
Author information
Authors and Affiliations
Corresponding author
Supplementary File
Rights and permissions
About this article
Cite this article
Tong, H., Shen, X., Li, C. et al. Improved nonlinear invariant attack. Sci. China Inf. Sci. 65, 139103 (2022). https://doi.org/10.1007/s11432-019-2632-1
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2632-1