Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
PRINCE - MaRDI portal

PRINCE

From MaRDI portal
Software:25155



swMATH13240MaRDI QIDQ25155


No author found.





Related Items (79)

Linear permutations and their compositional inverses over 𝔽qnRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA new non-random property of 4.5-round PRINCEA survey on implementation of lightweight block ciphers for resource constraints devicesPRINCEv2. More security for (almost) no overheadWARP: revisiting GFN for lightweight 128-bit block cipherDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersAuthenticated Encryption: How Reordering Can Impact PerformanceAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CorePractical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCEObservations on the SIMON Block Cipher FamilyCryptanalysis of Full SproutCHAM: a family of lightweight block ciphers for resource-constrained devicesNew observations on invariant subspace attackConstruction of MDS matrices combining the Feistel, Misty and Lai-Massey schemesAutomatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block CiphersMulti-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCECryptanalysis of Iterated Even-Mansour Schemes with Two KeysNew constructions of involutions over finite fieldsCryptanalysis of Reduced-Round SIMON32 and SIMON48Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxesConfused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxesStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionCryptanalysis of KLEINThe Simon and Speck Block Ciphers on AVR 8-Bit MicrocontrollersOn the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear AttacksA Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and ZorroBeyond-birthday secure domain-preserving PRFs from a single permutationImplementing Lightweight Block Ciphers on x86 ArchitecturesBlockcipher-based authenticated encryption: how small can we go?Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemMeet-in-the-middle attacks and structural analysis of round-reduced PRINCEFull analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresSide-Channel Analysis Protection and Low-Latency in ActionA new construction for involutions over finite fieldsBlockcipher-Based Authenticated Encryption: How Small Can We Go?Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based PrimitivesMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionCryptanalysis of masked ciphers: a not so random ideaThe phantom of differential characteristicsMore constructions of \(n\)-cycle permutationsDifferential attacks: using alternative operationsAKF: a key alternating Feistel scheme for lightweight cipher designsA MAC Mode for Lightweight Block CiphersTwo-to-one mappings and involutions without fixed points over \(\mathbb{F}_{2^n}\)Key alternating ciphers based on involutionsEspresso: a stream cipher for 5G wireless communication systemsReflection ciphersRedefining the transparency orderTruncated differential based known-key attacks on round-reduced SIMONInvolutory differentially 4-uniform permutations from known constructionsCharacterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\)On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric CryptanalysisBlock cipher invariants as eigenvectors of correlation matricesOn the constructions of \(n\)-cycle permutationsNonlinear diffusion layersPerfect nonlinear functions and cryptographyReflection cryptanalysis of PRINCE-like ciphersPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksCryptanalysis of Feistel Networks with Secret Round FunctionsExploring Energy Efficiency of Lightweight Block CiphersConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresPRINCE: Accurate approximation of the copy number of tandem repeatsCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticeThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsAnother View of the Division PropertyRevised version of block cipher CHAMThe summation-truncation hybrid: reusing discarded bits for freeCryptanalysis results on spook. Bringing full-round shadow-512 to the lightGeneric Key Recovery Attack on Feistel SchemeHashing Mode Using a Lightweight BlockcipherOn the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible DifferentialsA Search Strategy to Optimize the Affine Variant Properties of S-BoxesRegular complete permutation polynomials over \(\mathbb{F}_{2^n} \)On a generalization of substitution-permutation networks: the HADES design strategy


This page was built for software: PRINCE