FOX: a new family of block ciphers. n this paper, we describe the design of a new family of block ciphers based on a Lai-Massey scheme, named FOX. The main features of this design, besides a very high security level, are a large implementation flexibility on various platforms as well as high performances. In addition, we propose a new design of strong and efficient key-schedule algorithms. We provide evidence that FOX is immune to linear and differential cryptanalysis, and we discuss its security towards integral cryptanalysis, algebraic attacks, and other attacks.

References in zbMATH (referenced in 22 articles )

Showing results 1 to 20 of 22.
Sorted by year (citations)

1 2 next

  1. Tian, Shizhu; Boura, Christina; Perrin, Léo: Boomerang uniformity of popular S-box constructions (2020)
  2. Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John: Minimizing the two-round Even-Mansour cipher (2018)
  3. Gupta, Kishan Chand; Pandey, Sumit Kumar; Venkateswarlu, Ayineedi: Towards a general construction of recursive MDS diffusion layers (2017)
  4. Gupta, Kishan Chand; Pandey, Sumit Kumar; Venkateswarlu, Ayineedi: On the direct construction of recursive MDS matrices (2017)
  5. Luo, Yiyuan; Lai, Xuejia; Zhou, Yujie: Generic attacks on the Lai-Massey scheme (2017)
  6. Schimanski, Nichole L.; Caughman, John S. IV: Cycle structures of orthomorphisms extending partial orthomorphisms of Boolean groups (2016)
  7. Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi: New attacks on Feistel structures with improved memory complexities (2015)
  8. Gupta, Kishan; Ray, Indranil: Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (2015)
  9. Wu, Wenling; Zhang, Lei; Yu, Xiaoli: The DBlock family of block ciphers (2015)
  10. Shakiba, Mohsen; Dakhilalian, Mohammad; Mala, Hamid: On computational complexity of impossible differential cryptanalysis (2014)
  11. Bose, Utsab; Bhattacharya, Anup Kumar; Das, Abhijit: GPU-based implementation of 128-bit secure eta pairing over a binary field (2013)
  12. Chand Gupta, Kishan; Ghosh Ray, Indranil: On constructions of involutory MDS matrices (2013)
  13. Isobe, Takanori; Shibutani, Kyoji: All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach (2013)
  14. Yun, Aaram; Park, Je Hong; Lee, Jooyoung: On Lai-Massey and quasi-Feistel ciphers (2011)
  15. Biryukov, Alex; Nikolić, Ivica: Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others (2010)
  16. Luo, Yiyuan; Lai, Xuejia; Gong, Zheng: Pseudorandomness analysis of the (extended) Lai-Massey scheme (2010)
  17. Baignères, Thomas; Stern, Jacques; Vaudenay, Serge: Linear cryptanalysis of non binary ciphers (2007)
  18. Won, Dongho (ed.); Kim, Seungjoo (ed.): Information security and cryptology -- ICISC 2005. 8th international conference, Seoul, Korea, December 1--2, 2005. Revised selected papers. (2006)
  19. Wu, Wenling; Zhang, Wentao; Feng, Dengguo: Integral cryptanalysis of reduced FOX block cipher (2006)
  20. Englund, Håkan; Johansson, Thomas: A new simple technique to attack filter generators and related ciphers (2005)

1 2 next