Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
From MaRDI portal
Publication:2188966
DOI10.1007/s00145-020-09345-0zbMath1457.94119OpenAlexW3206441496MaRDI QIDQ2188966
Publication date: 15 June 2020
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-020-09345-0
Shift register sequences and sequences over finite alphabets in information and communication theory (94A55) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Reflection Cryptanalysis of PRINCE-Like Ciphers
- Security Analysis of PRINCE
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
- Multiple Differential Cryptanalysis of Round-Reduced PRINCE
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Theory and Applications of Satisfiability Testing
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Fast Software Encryption
This page was built for publication: Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE