You are looking at a specific version 20190808:064111 of this paper. See the latest version.

Paper 2019/906

Efficient and secure software implementations of Fantomas

Rafael J. Cruz and Antonio Guimarães and Diego F. Aranha

Abstract

In this paper, the efficient software implementation and side-channel resistance of the LS-Design construction is studied through a series of software implementations of the Fantomas block cipher, one of its most prominent instantiations. Target platforms include resource-constrained ARM devices like the Cortex-M3 and M4, and more powerful processors such as the ARM Cortex-A15 and modern Intel platforms. The implementations span a broad range of characteristics: 32-bit and 64-bit versions, unprotected and side-channel resistant, and vectorized code for NEON and SSE instruction sets. Our results improve the state of the art substantially, both in terms of efficiency and compactness, by making use of novel algorithmic techniques and features specific to the target platform. We finish by proposing and prototyping instruction set extensions to reduce by half the performance penalty of the introduced side-channel countermeasures.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Minor revision. Journal of Cryptographic Engineering
Keywords
LS-DesignFantomasside-channel resistancevectorizationinstruction set extension
Contact author(s)
dfaranha @ eng au dk
History
2019-08-08: received
Short URL
https://ia.cr/2019/906
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.