Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
The Design of Rijndael
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
New Block Encryption Algorithm MISTY
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
FOX: a new family of block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
HIGHT: a new block cipher suitable for low-resource device
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Related-Key impossible differential attacks on 8-round AES-192
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
On feistel structures using a diffusion switching mechanism
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
How far can we go on the x64 processors?
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Related-Key boomerang and rectangle attacks
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
An analysis of XSL Applied to BES
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Differential fault analysis on the ARIA algorithm
Information Sciences: an International Journal
Impossible Differential Cryptanalysis of CLEFIA
Fast Software Encryption
Looking Back at a New Hash Function
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Tweakable Pseudorandom Permutation from Generalized Feistel Structure
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
On Generalized Feistel Structures Using the Diffusion Switching Mechanism
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Impossible Differential Analysis of Reduced Round CLEFIA
Information Security and Cryptology
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Differential fault analysis on CLEFIA
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Improving the generalized Feistel
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Full-round differential attack on TWIS block cipher
WISA'10 Proceedings of the 11th international conference on Information security applications
Proposition of two cipher structures
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
On unbalanced Feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
Analysis of 3-line generalized Feistel networks with double SD-functions
Information Processing Letters
Impossible differential cryptanalysis of 13-round CLEFIA-128
Journal of Systems and Software
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure
Cryptography and Communications
LBlock: a lightweight block cipher
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
On maximum differential probability of generalized Feistel
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Piccolo: an ultra-lightweight blockcipher
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Parallelizing the camellia and SMS4 block ciphers
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Security analysis of the GF-NLFSR structure and four-cell block cipher
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
Information Processing Letters
Improved integral attacks on reduced-round CLEFIA block cipher
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Very compact hardware implementations of the blockcipher CLEFIA
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
On permutation layer of type 1, source-heavy, and target-heavy generalized feistel structures
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
An enhanced differential cache attack on CLEFIA for large cache lines
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Cryptanalysis of TWIS block cipher
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
Zero correlation linear cryptanalysis with reduced data complexity
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Low-latency encryption: is "Lightweight = light + wait"?
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Generalized Feistel networks revisited
Designs, Codes and Cryptography
PRINCE: a low-latency block cipher for pervasive computing applications
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
International Journal of Applied Cryptography
Comprehensive study of integral analysis on 22-round LBlock
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
S-box construction from non-permutation power functions
Proceedings of the 6th International Conference on Security of Information and Networks
Improbable differential cryptanalysis
Proceedings of the 6th International Conference on Security of Information and Networks
Preimage attacks on Feistel-SP functions: impact of omitting the last network twist
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs
Proceedings of the Workshop on Embedded Systems Security
Analysis and improvement of the generic higher-order masking scheme of FSE 2012
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Improbable differential attacks on Present using undisturbed bits
Journal of Computational and Applied Mathematics
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Designs, Codes and Cryptography
Information Processing Letters
Hi-index | 0.00 |
We propose a new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is compatible with AES. CLEFIA achieves enough immunity against known attacks and flexibility for efficient implementation in both hardware and software by adopting several novel and state-of-the-art design techniques. CLEFIA achieves a good performance profile both in hardware and software. In hardware using a 0.09 µm CMOS ASIC library, about 1.60 Gbps with less than 6 Kgates, and in software, about 13 cycles/byte, 1.48 Gbps on 2.4 GHz AMD Athlon 64 is achieved. CLEFIA is a highly efficient blockcipher, especially in hardware.