Pages that link to "Item:Q3525066"
From MaRDI portal
The following pages link to PRESENT: An Ultra-Lightweight Block Cipher (Q3525066):
Displaying 50 items.
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (Q269576) (← links)
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- Biclique cryptanalysis of LBlock and TWINE (Q396619) (← links)
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures (Q404952) (← links)
- On weakly APN functions and 4-bit S-boxes (Q413552) (← links)
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock (Q456064) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Differential cryptanalysis of PRESENT-like cipher (Q494577) (← links)
- On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion (Q503549) (← links)
- Espresso: a stream cipher for 5G wireless communication systems (Q505077) (← links)
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (Q510448) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- A new counting method to bound the number of active S-boxes in Rijndael and 3D (Q522208) (← links)
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- Switchings, extensions, and reductions in central digraphs (Q549248) (← links)
- Secure hardware implementation of nonlinear functions in the presence of glitches (Q656517) (← links)
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups (Q821312) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- On some block ciphers and imprimitive groups (Q843945) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- Generalized MitM attacks on full TWINE (Q894457) (← links)
- Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited (Q894458) (← links)
- A new construction of differentially 4-uniform \((n,n-1)\)-functions (Q895007) (← links)
- On hidden sums compatible with a given block cipher diffusion layer (Q1625795) (← links)
- New observations on invariant subspace attack (Q1653027) (← links)
- Bridging the gap: advanced tools for side-channel leakage estimation beyond Gaussian templates and histograms (Q1698615) (← links)
- On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes (Q1698626) (← links)
- Hold your breath, PRIMATEs are lightweight (Q1698631) (← links)
- Wave-shaped round functions and primitive groups (Q1726011) (← links)
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes (Q1726666) (← links)
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis (Q1726672) (← links)
- Differential attacks: using alternative operations (Q1727339) (← links)
- Some results on Fruit (Q1727353) (← links)
- Speeding up the GVW algorithm via a substituting method (Q1730310) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Making the impossible possible (Q1747659) (← links)
- Design and analysis of small-state grain-like stream ciphers (Q1749794) (← links)
- Cellular automata based S-boxes (Q1755184) (← links)
- A note on some algebraic trapdoors for block ciphers (Q1784991) (← links)
- MRHS solver based on linear algebra and exhaustive search (Q1787192) (← links)
- Nonlinear diffusion layers (Q1791664) (← links)
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers (Q1934241) (← links)
- Slender-set differential cryptanalysis (Q1946602) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)