|
[1]
|
D. Augot and M. Finiasz, Exhaustive search for small dimension recursive MDS diffusion layers or block ciphers and hash functions, In Proc. of the 2013 IEEE International Symposium on Information Theory, IEEE, 2013, 1551–1555.
doi: 10.1109/ISIT.2013.6620487.
|
|
[2]
|
D. Augot and M. Finiasz, Direct construction of recursive mds diffusion layers using shortened BCH codes, In FSE 2014, LNCS, Springer, 8540 (2015), 3–17, Also available http://eprint.iacr.org/2014/566.pdf.
doi: 10.1007/978-3-662-46706-0_1.
|
|
[3]
|
P. S. L. M. Barreto and V. Rijmen, The Khazad Legacy-Level Block Cipher, Submission to the NESSIE Project, 2000. Available at https://www.cosic.esat.kuleuven.be/nessie/workshop/submissions.html.
|
|
[4]
|
P. S. L. M. Barreto and V. Rijmen, The Anubis block cipher, Submission to the NESSIE Project, 2000. Available at https://www.cosic.esat.kuleuven.be/nessie/workshop/submissions.html.
|
|
[5]
|
P. S. L. M. Barreto and V. Rijmen, The Whirlpool hashing function, In Proceedings of the 1st NESSIE Workshop, 15 pages, 2000. Available at https://www.cosic.esat.kuleuven.be/nessie/workshop/submissions.html.
|
|
[6]
|
C. Beierle, T. Kranz and G. Leander, Lightweight multiplication in $GF(2^n)$ with applications to MDS matrices, Advances in cryptology–CRYPTO 2016. Part I, 625–653, Lecture Notes in Comput. Sci., 9814, Springer, Berlin, 2016.
doi: 10.1007/978-3-662-53018-4_23.
|
|
[7]
|
T. P. Berger, Construction of recursive MDS diffusion layers from gabidulin codes, In INDOCRYPT 2013, LNCS, Springer, 8250 (2013), 274–285.
doi: 10.1007/978-3-319-03515-4_18.
|
|
[8]
|
T. P. Berger and A. Ourivski, Construction of new MDS codes from Gabidulin codes, In Proceedings of ACCT 2009, Kranevo, Bulgaria, 40–47, June, 2004.
|
|
[9]
|
W. Bosma, J. Cannon and C. Playoust, The magma algebra system I: The user language, J. Symbolic Comput, 24 (1997), 235–265, Computational algebra and number theory (London, 1993).
doi: 10.1006/jsco.1996.0125.
|
|
[10]
|
G. Castagnoli, J. L. Massey, P. A. Schoeller and N. von Seeman, On repeated-root cyclic codes, In IEEE Transactions on Inform. Theory, 37 (1991), 337–342.
doi: 10.1109/18.75249.
|
|
[11]
|
V. Cauchois and P. Loidreau, About circulant involutory MDS matrices, Des. Codes Cryptogr., 87 (2019), 249-260.
doi: 10.1007/s10623-018-0520-3.
|
|
[12]
|
J. Choy, H. Yap, K. Khoo, J. Guo, T. Peyrin, A. Poschmann and C. H. Tan, SPN-hash: Improving the provable resistance against differential collision attacks, Progress in cryptology–AFRICACRYPT 2012, 270–286, Lecture Notes in Comput. Sci., 7374, Springer, Heidelberg, 2012.
doi: 10.1007/978-3-642-31410-0_17.
|
|
[13]
|
T. Cui, C. Jin and Z. Kong, On compact cauchy matrices for substitution-permutation networks, In IEEE Transactions on Computers, 64 (2015), 2098–2102.
doi: 10.1109/TC.2014.2346180.
|
|
[14]
|
J. Daemen, L. R. Knudsen and V. Rijmen, The block cipher SQUARE, In 4th Fast Software Encryption Workshop, LNCS, 1267 (1997), 149–165, Springer-Verlag.
doi: 10.1007/BFb0052343.
|
|
[15]
|
J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, Springer-Verlag, 2002.
doi: 10.1007/978-3-662-04722-4.
|
|
[16]
|
G. D. Filho, P. Barreto and V. Rijmen, The Maelstrom-0 Hash Function, In Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security, 2006.
|
|
[17]
|
P. Gauravaram, L. R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger, M. Schlaffer and S. Thomsen, Gr$\phi$stl a SHA-3 Candidate, Submission to NIST, 2008, Available at http://www.groestl.info/.
|
|
[18]
|
R. M. Gray, Toeplitz and Circulant Matrices: A Review Foundations and Trends in Communications and Information Theory, NOW, 2005.
doi: 10.1561/0100000006.
|
|
[19]
|
J. Guo, T. Peyrin and A. Poschmann, The PHOTON family of lightweight hash functions, In CRYPTO, Springer, 2011 (2011), 222–239.
doi: 10.1007/978-3-642-22792-9_13.
|
|
[20]
|
J. Guo, T. Peyrin, A. Poshmann and M. J. B. Robshaw, The LED block cipher, In CHES 2011, LNCS, 6917 (2011), 326–341, Springer.
doi: 10.1007/978-3-642-23951-9_22.
|
|
[21]
|
K. C. Gupta and I. G. Ray, On constructions of involutory MDS matrices, Progress in cryptology–AFRICACRYPT 2013, 7918 (2013), 43–60.
doi: 10.1007/978-3-642-38553-7_3.
|
|
[22]
|
K. C. Gupta and I. G. Ray, On constructions of MDS matrices from companion matrices for lightweight cryptography, In CD-ARES 2013 Workshops: MoCrySEn, Springer, 8128 (2013), 29–43.
doi: 10.1007/978-3-642-40588-4_3.
|
|
[23]
|
K. C. Gupta and I. G. Ray, On constructions of circulant MDS matrices for lightweight cryptography, In ISPEC 2014, Springer, 2014, 564–576.
|
|
[24]
|
K. C. Gupta and I. G. Ray, Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications, Cryptography and Communications, 7 (2015), 257-287.
doi: 10.1007/s12095-014-0116-3.
|
|
[25]
|
K. C. Gupta, S. K. Pandey and A. Venkateswarlu, Towards a general construction of recursive MDS diffusion layers, In WCC2015, https://hal.inria.fr/hal-01276436.
|
|
[26]
|
K. C. Gupta, S. K. Pandey and A. Venkateswarlu, On the direct construction of recursive
MDS matrices, In Des. Codes Crypto., 82 (2017), 77–94.
doi: 10.1007/s10623-016-0233-4.
|
|
[27]
|
K. C. Gupta, S. K. Pandey and A. Venkateswarlu, Towards a general construction of recursive
MDS diffusion layers, In Des. Codes Crypto., 82 (2017), 179–195.
doi: 10.1007/s10623-016-0261-0.
|
|
[28]
|
K. C. Gupta, S. K. Pandey and A. Venkateswarlu, Almost involutory recursive MDS diffusion layers, Design, Codes and Cryptography, 87 (2019), 609-626.
doi: 10.1007/s10623-018-0582-2.
|
|
[29]
|
H. Han and H. Zhang, The research on the maximum branch number of P-permutations, 2010 2nd International Workshop on Intelligent Systems and Applications, Wuhan, 2010, 1–4.
doi: 10.1109/IWISA.2010.5473354.
|
|
[30]
|
H. M. Heys and S. E. Tavares, The design of substitution-permutation networks resistant to differential and linear cryptanalysis, Proceedings of 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, 1994, 148–155.
doi: 10.1145/191177.191206.
|
|
[31]
|
H. M. Heys and S. E. Tavares, Avalanche characteristics of substitution-permutation encryption networks, IEEE Trans. Comp., 44 (1995), 1131-1139.
doi: 10.1109/12.464391.
|
|
[32]
|
H. M. Heys and S. E. Tavares, The design of product ciphers resistant to differential and linear cryptanalysis, Journal of Cryptology, 9 (1996), 1-19.
doi: 10.1007/BF02254789.
|
|
[33]
|
J. W. P. Hirschfeld, The main conjecture for MDS codes, Cryptography and Coding (Cirencester, 1995),, Lecture Notes in Comput. Sci., 1025 (1995), 44–52.
doi: 10.1007/3-540-60693-9_7.
|
|
[34]
|
P. Junod and S. Vaudenay, Perfect diffusion primitives for block ciphers building efficient MDS matrices, Selected Areas in Cryptography, 84–99, Lecture Notes in Comput. Sci., 3357, Springer, Berlin, 2005.
doi: 10.1007/978-3-540-30564-4_6.
|
|
[35]
|
P. Junod and S. Vaudenay, FOX: A new family of block ciphers, Selected Areas in Cryptography, 114–129, Lecture Notes in Comput. Sci., 3357, Springer, Berlin, 2005.
doi: 10.1007/978-3-540-30564-4_8.
|
|
[36]
|
P. Junod and M. Macchetti, Revisiting the IDEA philosophy, International Workshop on Fast Software Encryption, FSE 2009: Fast Software Encryption, Lecture Notes in Computer Science, 5665 (2009), 277–295.
doi: 10.1007/978-3-642-03317-9_17.
|
|
[37]
|
K. Khoo, T. Peyrin, A. Y. Poschmann and H. Yap, FOAM: Searching for hardware-optimal SPN structures and components with a fair comparison, In Lejla Batina and Matthew Robshaw, editors, Cryptographic Hardware and Embedded Systems-CHES 2014, volume 8731 of Lecture Notes in Computer Science, pages 433–450. Springer Berlin Heidelberg, 2014.
|
|
[38]
|
N. Kolokotronis, K. Limniotis and N. Kalouptsidis, Factorization of determinants over finite
fields and application in stream ciphers, In Cryptogr. Commun., 1 (2009), 175–205.
doi: 10.1007/s12095-008-0005-8.
|
|
[39]
|
I. Kra and S. R. Santiago, On circulant matrices, Notices of the AMS, 59 (2012), 368-377.
doi: 10.1090/noti804.
|
|
[40]
|
J. Lacan and J. Fimes, A construction of matrices with no singular square submatrices, Finite Fields and Applications, 2948 (2004), 145-147.
doi: 10.1007/978-3-540-24633-6_11.
|
|
[41]
|
J. Lacan and J. Fimes, Systematic MDS erasure codes based on vandermonde matrices, IEEE Trans. Commun. Lett., 8 (2004), 570-572.
doi: 10.1109/LCOMM.2004.833807.
|
|
[42]
|
R. Lidl and H. Niederreiter, Finite Fields, Cambridge University Press, Cambridge, 2nd
edition, 1997.
|
|
[43]
|
J. H. van Lint, Repeated-Root Cyclic Codes, IEEE Transactions on Inform. Theory, 37 (1991), 343-345.
doi: 10.1109/18.75250.
|
|
[44]
|
M. Liu and S. M. Sim, Lightweight MDS generalized circulant matrices, International Conference on Fast Software Encryption, Lecture Notes in Computer Science, 9783 (2016), 101–120. Springer, Berlin, Heidelberg.
doi: 10.1007/978-3-662-52993-5_6.
|
|
[45]
|
F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, North-Holland Publishing Co., Amsterdam-New York-Oxford, 1977.
|
|
[46]
|
F. Mattoussi, V. Roca and B. Sayadi, Complexity comparison of the use of Vandermonde versus Hankel matrices to build systematic MDS Reed-Solomon codes, 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cesme, 2012, 344–348.
doi: 10.1109/SPAWC.2012.6292924.
|
|
[47]
|
J. Nakahara and E. Abrahao, A New Involutory MDS Matrix for the AES, International Journal of Network Security, 9 (2009), 109-116.
|
|
[48]
|
M. K. Pehlivanoǧlu, M. T. Sakalli, S. Akleylek, N. Duru and V. Rijmen, Generalisation of
Hadamard matrix to generate involutory MDS matrices for lightweight cryptography, In IET
Information Security, 12 (2018), 348–355.
|
|
[49]
|
A. R. Rao and P. Bhimasankaram, Linear Algebra, Second Edition, Hindustan Book Agency.
|
|
[50]
|
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. D. Win, The cipher SHARK, In 3rd Fast Software Encryption Workshop, LNCS, 1039 (1996), 99–111, Springer-Verlag.
doi: 10.1007/3-540-60865-6_47.
|
|
[51]
|
R. M. Roth and G. Seroussi, On generator matrices of MDS codes, In IEEE Transactions on
Information Theory, 31 (1985), 826–830.
doi: 10.1109/TIT.1985.1057113.
|
|
[52]
|
R. M. Roth and A. Lempel, On MDS codes via Cauchy matrices, In IEEE Transactions on
Information Theory, 35 (1989), 1314–1319.
doi: 10.1109/18.45291.
|
|
[53]
|
M. Sajadieh, M. Dakhilalian, H. Mala and B. Omoomi, On construction of involutory MDS matrices from Vandermonde Matrices in $GF(2^q)$, Design, Codes Cryptography, 64 (2012), 287-308.
doi: 10.1007/s10623-011-9578-x.
|
|
[54]
|
M. Sajadieh, M. Dakhilalian, H. Mala and P. Sepehrdad, Recursive diffusion layers for block ciphers and hash functions, FSE 2012, 7549 (2012), 385-401.
doi: 10.1007/978-3-642-34047-5_22.
|
|
[55]
|
S. Sarkar and H. Syed, Lightweight diffusion layer: Importance of Toeplitz matrices, IACR Trans. Symmetric Cryptol., 2016 (2016), 95-113.
|
|
[56]
|
S. Sarkar and H. Syed, Analysis of toeplitz MDS matrices, ACISP 2017, LNCS, 10343 (2017), 3–18.
doi: 10.1007/978-3-319-59870-3_1.
|
|
[57]
|
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall and N. Ferguson, Twofish: A 128-bit block cipher, In the first AES Candidate Conference. National Institute for Standards and Technology, 1998.
|
|
[58]
|
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall and N. Ferguson, The Twofish encryption algorithm, Wiley, 1999.
|
|
[59]
|
C. Schnorr and S. Vaudenay, Black box cryptanalysis of hash networks based on multipermutations, Advances in cryptology–EUROCRYPT '94 (Perugia), Proceedings, LNCS, Springer-Verlag, 950 (1995), 47–57.
doi: 10.1007/BFb0053423.
|
|
[60]
|
C. E. Shannon, Communication theory of secrecy systems, Bell Syst. Technical J., 28 (1949), 656-715.
doi: 10.1002/j.1538-7305.1949.tb00928.x.
|
|
[61]
|
T. Shirai and K. Shibutani, On the diffusion matrix employed in the Whirlpool hashing function, NESSIE public report, 2003. Available at https://www.cosic.esat.kuleuven.be/nessie/reports/phase2/whirlpool-20030311.pdf.
|
|
[62]
|
T. Shirai, K. Shibutani, T. Akishita, S. Moriai and T. Iwata, The 128-Bit blockcipher CLEFIA (Extended Abstract), Fnternational Workshop on Fast Software Encryption, Lecture Notes in Computer Science, 4593 (2017), 181–195, Springer, Berlin, Heidelberg
doi: 10.1007/978-3-540-74619-5_12.
|
|
[63]
|
S. M. Sim, K. Khoo, F. Oggier and T. Peyrin, Lightweight MDS Involution Matrices, FSE 2015: Fast Software Encryption, Lecture Notes in Computer Science, 9054 (2015), 471–493. Springer, Berlin, Heidelberg.
doi: 10.1007/978-3-662-48116-5_23.
|
|
[64]
|
D. Toh, J. Teo, K. Khoo and S. Sim, Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count, In AFRICACRYPT 2018, LNCS, 10831 (2018), 51–71.
doi: 10.1007/978-3-319-89339-6_4.
|
|
[65]
|
S. Vaudenay, On the need for multipermutations: Cryptanalysis of MD4 and SAFER, Fast Software Encryption, Proceedings, LNCS, 108 (1995), 286–297. Springer-Verlag, 1995.
doi: 10.1007/3-540-60590-8_22.
|
|
[66]
|
D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi and B. Preneel, A new keystream generator MUGI, FSE 2002: Fast Software Encryption, Springer Berlin/Heidelberg, 2365 (2002), 179–194.
doi: 10.1007/3-540-45661-9_14.
|
|
[67]
|
S. Wu, M. Wang and W. Wu, Recursive diffusion layers for (lightweight) block ciphers and hash functions, SAC 2012: Selected Areas in Cryptography, LNCS, Springer-Verlag Berlin Heidelberg, 7707 (2013), 355–371.
doi: 10.1007/978-3-642-35999-6_23.
|
|
[68]
|
A. M. Youssef, S. E. Tavares and H. M. Heys, A New Class of Substitution Permutation Networks, Workshop on Selected Areas in Cryptography, SAC '96, Workshop Record, (1996), 132–147.
|
|
[69]
|
A. M. Youssef, S. Mister and S. E. Tavares, On the Design of Linear Transformations for Substitution Permutation Encryption Networks, In Workshop On Selected Areas in Cryptography, SAC, 97 (1997), 40–48.
|