PRINCE
From MaRDI portal
Software:25155
No author found.
Related Items (79)
Linear permutations and their compositional inverses over 𝔽qn ⋮ Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A new non-random property of 4.5-round PRINCE ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ PRINCEv2. More security for (almost) no overhead ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ Authenticated Encryption: How Reordering Can Impact Performance ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ Observations on the SIMON Block Cipher Family ⋮ Cryptanalysis of Full Sprout ⋮ CHAM: a family of lightweight block ciphers for resource-constrained devices ⋮ New observations on invariant subspace attack ⋮ Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes ⋮ Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers ⋮ Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE ⋮ Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys ⋮ New constructions of involutions over finite fields ⋮ Cryptanalysis of Reduced-Round SIMON32 and SIMON48 ⋮ Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes ⋮ Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Cryptanalysis of KLEIN ⋮ The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers ⋮ On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks ⋮ A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ Implementing Lightweight Block Ciphers on x86 Architectures ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem ⋮ Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE ⋮ Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ A new construction for involutions over finite fields ⋮ Blockcipher-Based Authenticated Encryption: How Small Can We Go? ⋮ Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ The phantom of differential characteristics ⋮ More constructions of \(n\)-cycle permutations ⋮ Differential attacks: using alternative operations ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Two-to-one mappings and involutions without fixed points over \(\mathbb{F}_{2^n}\) ⋮ Key alternating ciphers based on involutions ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ Reflection ciphers ⋮ Redefining the transparency order ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ Involutory differentially 4-uniform permutations from known constructions ⋮ Characterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\) ⋮ On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ On the constructions of \(n\)-cycle permutations ⋮ Nonlinear diffusion layers ⋮ Perfect nonlinear functions and cryptography ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ PRINCE: Accurate approximation of the copy number of tandem repeats ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Another View of the Division Property ⋮ Revised version of block cipher CHAM ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ Cryptanalysis results on spook. Bringing full-round shadow-512 to the light ⋮ Generic Key Recovery Attack on Feistel Scheme ⋮ Hashing Mode Using a Lightweight Blockcipher ⋮ On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ Regular complete permutation polynomials over \(\mathbb{F}_{2^n} \) ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
This page was built for software: PRINCE