ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware. We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are involutional and allow very efficient combinations of encryption/decryption. Hardware implementations of ICEBERG allow to change the key at every clock cycle without any performance loss and its round keys are derived “on-the-fly” in encryption and decryption modes (no storage of round keys is needed). The resulting design offers better hardware efficiency than other recent 128-key-bit block ciphers. Resistance against side-channel cryptanalysis was also considered as a design criteria for ICEBERG.

References in zbMATH (referenced in 22 articles , 1 standard article )

Showing results 1 to 20 of 22.
Sorted by year (citations)

1 2 next

  1. Trifonov, D. I.; Fomin, D. B.: Invariant subspaces in SPN block cipher (2021)
  2. Fomin, D. B.: Construction of permutations on the space (V_2m) by means of ((2m,m))-functions (2020)
  3. Belov, S. A.: An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial (2019)
  4. Fomin, D. B.: New classes of 8-bit permutations based on a butterfly structure (2019)
  5. Lee, Jooyoung: Key alternating ciphers based on involutions (2018)
  6. Boura, Christina; Canteaut, Anne; Knudsen, Lars R.; Leander, Gregor: Reflection ciphers (2017)
  7. Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan: Construction of lightweight S-boxes using Feistel and MISTY structures (2016)
  8. Tan, Yin; Gong, Guang; Zhu, Bo: Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (2016)
  9. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  10. Soleimany, Hadi; Blondeau, Céline; Yu, Xiaoli; Wu, Wenling; Nyberg, Kaisa; Zhang, Huiling; Zhang, Lei; Wang, Yanfeng: Reflection cryptanalysis of PRINCE-like ciphers (2015)
  11. Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke: Cryptanalysis of reduced-round SIMON32 and SIMON48 (2014)
  12. Kerckhof, Stéphanie; Durvaux, François; Hocquet, Cédric; Bol, David; Standaert, François-Xavier: Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint (2012)
  13. Mitrokotsa, Aikaterini (ed.); Vaudenay, Serge (ed.): Progress in cryptology -- AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10--12, 2012. Proceedings (2012)
  14. Ryan, Mark D. (ed.); Smyth, Ben (ed.); Wang, Guilin (ed.): Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9--12, 2012. Proceedings (2012)
  15. Saarinen, Markku-Juhani O.: Cryptographic analysis of all (4 \times4)-bit s-boxes (2012)
  16. Sun, Yue; Wang, Meiqin: Linear cryptanalysis of reduced-round ICEBERG (2012)
  17. Sung, Jaechul; Hong, Deukjo; Hong, Seokhie: Cryptanalysis of an involutional block cipher using cellular automata (2007)
  18. Standaert, François-Xavier; Piret, Gilles; Gershenfeld, Neil; Quisquater, Jean-Jacques: SEA: a scalable encryption algorithm for small embedded applications (2006)
  19. Piret, Gilles; Quisquater, Jean-Jacques: Security of the MISTY structure in the Luby-Rackoff model: Improved results (2005)
  20. Joshi, Nikhil; Wu, Kaijie; Karri, Ramesh: Concurrent error detection schemes for involution ciphers (2004)

1 2 next