PRESENT
From MaRDI portal
Software:20323
No author found.
Related Items (only showing first 100 items - show all)
Protection measurements of computer network information security for big data ⋮ Cryptographic Analysis of All 4 × 4-Bit S-Boxes ⋮ The Cryptographic Power of Random Selection ⋮ Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ Impossible Differential Attacks on Reduced-Round LBlock ⋮ Cryptanalysis of FlexAEAD ⋮ Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices ⋮ The GLUON Family: A Lightweight Hash Function Family Based on FCSRs ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Known-Key Distinguisher on Full PRESENT ⋮ A Key to Success ⋮ BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications ⋮ Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics ⋮ Primitivity of PRESENT and other lightweight ciphers ⋮ Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers ⋮ Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix ⋮ A Framework for Automated Independent-Biclique Cryptanalysis ⋮ Cryptanalysis of KLEIN ⋮ The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers ⋮ Structural Evaluation by Generalized Integral Property ⋮ Implementing Lightweight Block Ciphers on x86 Architectures ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not ⋮ Blockcipher-Based Authenticated Encryption: How Small Can We Go? ⋮ GIFT: A Small Present ⋮ PRESENT Runs Fast ⋮ Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives ⋮ PRESENT: An Ultra-Lightweight Block Cipher ⋮ Hiding Higher-Order Side-Channel Leakage ⋮ Bitsliced Masking and ARM: Friends or Foes? ⋮ Biclique Attack of Block Cipher SKINNY ⋮ Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents ⋮ Security Evaluation Against Side-Channel Analysis at Compilation Time ⋮ Threshold Implementation in Software ⋮ A First-Order SCA Resistant AES Without Fresh Randomness ⋮ Pushing the Limits: A Very Compact and a Threshold Implementation of AES ⋮ Higher-Order Masking Schemes for S-Boxes ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Lightweight MDS Generalized Circulant Matrices ⋮ There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial ⋮ Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections ⋮ LBlock: A Lightweight Block Cipher ⋮ Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations ⋮ Multiple Differential Cryptanalysis: Theory and Practice ⋮ Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications ⋮ Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model ⋮ How Fast Can Higher-Order Masking Be in Software? ⋮ On the Multi-output Filtering Model and Its Applications ⋮ New Links between Differential and Linear Cryptanalysis ⋮ ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware ⋮ Greedy Distinguishers and Nonrandomness Detectors ⋮ Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise ⋮ A New Variant of PMAC: Beyond the Birthday Bound ⋮ PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware ⋮ A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box ⋮ О классах слабых ключей обобщенной шифрсистемы PRINT ⋮ : Increasing the Security and Efficiency of ⋮ A Statistical Saturation Attack against the Block Cipher PRESENT ⋮ О разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановках ⋮ Спектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметров ⋮ Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT ⋮ Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications ⋮ Pen and Paper Arguments for SIMON and SIMON-like Designs ⋮ The Cryptanalysis of Reduced-Round SMS4 ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks ⋮ Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT ⋮ Understanding Cryptography ⋮ Cryptanalysis of the Light-Weight Cipher A2U2 ⋮ Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere ⋮ Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN ⋮ Another View of the Division Property ⋮ Towards Secure and Practical MACs for Body Sensor Networks ⋮ Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 ⋮ Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs ⋮ Hash Functions and RFID Tags: Mind the Gap ⋮ Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts ⋮ Chai-Tea, Cryptographic Hardware Implementations of xTEA ⋮ AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects ⋮ Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions ⋮ Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups ⋮ Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ Thinking outside the superbox ⋮ Resilient uniformity: applying resiliency in masking ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ On hidden sums compatible with a given block cipher diffusion layer ⋮ Improved (related-key) differential cryptanalysis on GIFT
This page was built for software: PRESENT