ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware. We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are involutional and allow very efficient combinations of encryption/decryption. Hardware implementations of ICEBERG allow to change the key at every clock cycle without any performance loss and its round keys are derived “on-the-fly” in encryption and decryption modes (no storage of round keys is needed). The resulting design offers better hardware efficiency than other recent 128-key-bit block ciphers. Resistance against side-channel cryptanalysis was also considered as a design criteria for ICEBERG.

References in zbMATH (referenced in 15 articles , 1 standard article )

Showing results 1 to 15 of 15.
Sorted by year (citations)

  1. Boura, Christina; Canteaut, Anne; Knudsen, Lars R.; Leander, Gregor: Reflection ciphers (2017)
  2. Tan, Yin; Gong, Guang; Zhu, Bo: Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (2016)
  3. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  4. Soleimany, Hadi; Blondeau, Céline; Yu, Xiaoli; Wu, Wenling; Nyberg, Kaisa; Zhang, Huiling; Zhang, Lei; Wang, Yanfeng: Reflection cryptanalysis of PRINCE-like ciphers (2015)
  5. Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke: Cryptanalysis of reduced-round SIMON32 and SIMON48 (2014)
  6. Kerckhof, Stéphanie; Durvaux, François; Hocquet, Cédric; Bol, David; Standaert, François-Xavier: Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint (2012)
  7. Mitrokotsa, Aikaterini (ed.); Vaudenay, Serge (ed.): Progress in cryptology -- AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10--12, 2012. Proceedings (2012)
  8. Ryan, Mark D. (ed.); Smyth, Ben (ed.); Wang, Guilin (ed.): Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9--12, 2012. Proceedings (2012)
  9. Sun, Yue; Wang, Meiqin: Linear cryptanalysis of reduced-round ICEBERG (2012)
  10. Sung, Jaechul; Hong, Deukjo; Hong, Seokhie: Cryptanalysis of an involutional block cipher using cellular automata (2007)
  11. Standaert, François-Xavier; Piret, Gilles; Gershenfeld, Neil; Quisquater, Jean-Jacques: SEA: a scalable encryption algorithm for small embedded applications (2006)
  12. Piret, Gilles; Quisquater, Jean-Jacques: Security of the MISTY structure in the Luby-Rackoff model: Improved results (2005)
  13. Joshi, Nikhil; Wu, Kaijie; Karri, Ramesh: Concurrent error detection schemes for involution ciphers (2004)
  14. Roy, Bimal (ed.); Meier, Willi (ed.): Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5--7, 2004. Revised papers. (2004)
  15. Standaert, Francois-Xavier; Piret, Gilles; Rouvroy, Gael; Quisquater, Jean-Jacques; Legat, Jean-Didier: ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware (2004)