Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
PRESENT - MaRDI portal

PRESENT

From MaRDI portal
Software:20323



swMATH8313MaRDI QIDQ20323


No author found.





Related Items (only showing first 100 items - show all)

Protection measurements of computer network information security for big dataCryptographic Analysis of All 4 × 4-Bit S-BoxesThe Cryptographic Power of Random SelectionCombined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipherA survey on implementation of lightweight block ciphers for resource constraints devicesImpossible Differential Attacks on Reduced-Round LBlockCryptanalysis of FlexAEADCompact Implementation and Performance Evaluation of Block Ciphers in ATtiny DevicesThe GLUON Family: A Lightweight Hash Function Family Based on FCSRsDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple PlatformsAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreKnown-Key Distinguisher on Full PRESENTA Key to SuccessBitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight ApplicationsMultiple Differential Cryptanalysis Using LLR and χ 2 StatisticsPrimitivity of PRESENT and other lightweight ciphersAutomatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block CiphersOut of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic MatrixA Framework for Automated Independent-Biclique CryptanalysisCryptanalysis of KLEINThe Simon and Speck Block Ciphers on AVR 8-Bit MicrocontrollersStructural Evaluation by Generalized Integral PropertyImplementing Lightweight Block Ciphers on x86 ArchitecturesSide-Channel Analysis Protection and Low-Latency in ActionApplying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersA Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is NotBlockcipher-Based Authenticated Encryption: How Small Can We Go?GIFT: A Small PresentPRESENT Runs FastBit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based PrimitivesPRESENT: An Ultra-Lightweight Block CipherHiding Higher-Order Side-Channel LeakageBitsliced Masking and ARM: Friends or Foes?Biclique Attack of Block Cipher SKINNYUltra-Lightweight Implementations for Smart Devices – Security for 1000 Gate EquivalentsSecurity Evaluation Against Side-Channel Analysis at Compilation TimeThreshold Implementation in SoftwareA First-Order SCA Resistant AES Without Fresh RandomnessPushing the Limits: A Very Compact and a Threshold Implementation of AESHigher-Order Masking Schemes for S-BoxesA MAC Mode for Lightweight Block CiphersLightweight MDS Generalized Circulant MatricesThere Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel AttacksAutomatic Search for Key-Bridging Technique: Applications to LBlock and TWINEAn algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomialDesigning Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point ConnectionsLBlock: A Lightweight Block CipherDifferential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of PermutationsMultiple Differential Cryptanalysis: Theory and PracticeCryptanalysis of PRESENT-Like Ciphers with Secret S-BoxesA Single-Key Attack on the Full GOST Block CipherPRINCE – A Low-Latency Block Cipher for Pervasive Computing ApplicationsAlgebraic Side-Channel Attacks Beyond the Hamming Weight Leakage ModelHow Fast Can Higher-Order Masking Be in Software?On the Multi-output Filtering Model and Its ApplicationsNew Links between Differential and Linear CryptanalysisARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to HardwareGreedy Distinguishers and Nonrandomness DetectorsEfficient Cryptographic Protocols Based on the Hardness of Learning Parity with NoiseA New Variant of PMAC: Beyond the Birthday BoundPET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in HardwareA Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-BoxО классах слабых ключей обобщенной шифрсистемы PRINT: Increasing the Security and Efficiency ofA Statistical Saturation Attack against the Block Cipher PRESENTО разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановкахСпектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметровImplementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID TagsA 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANOne-Key Compression Function Based MAC with Security Beyond Birthday BoundLightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHTMultivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic ApplicationsPen and Paper Arguments for SIMON and SIMON-like DesignsThe Cryptanalysis of Reduced-Round SMS4The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection AttacksLinear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENTUnderstanding CryptographyCryptanalysis of the Light-Weight Cipher A2U2Linear Cryptanalysis of PRINTcipher – Trails and Samples EverywherePractical Attack on 8 Rounds of the Lightweight Block Cipher KLEINAnother View of the Division PropertyTowards Secure and Practical MACs for Body Sensor NetworksStructural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFsHash Functions and RFID Tags: Mind the GapSpecific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known PlaintextsChai-Tea, Cryptographic Hardware Implementations of xTEAAMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation FrameworkA Search Strategy to Optimize the Affine Variant Properties of S-BoxesNew Impossible Differential Search Tool from Design and Cryptanalysis AspectsEnhanced criteria on differential uniformity and nonlinearity of cryptographically significant functionsInvestigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroupsRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingThinking outside the superboxResilient uniformity: applying resiliency in masking\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsOn hidden sums compatible with a given block cipher diffusion layerImproved (related-key) differential cryptanalysis on GIFT


This page was built for software: PRESENT