Pages that link to "Item:Q3525066"
From MaRDI portal
The following pages link to PRESENT: An Ultra-Lightweight Block Cipher (Q3525066):
Displayed 50 items.
- Linearly equivalent s-boxes and the division property (Q2004975) (← links)
- Regular subgroups with large intersection (Q2009075) (← links)
- The resistance of PRESENT-80 against related-key differential attacks (Q2016426) (← links)
- Multiplicative complexity of bijective \(4\times 4\) \(S\)-boxes (Q2016430) (← links)
- Cryptographic properties of small bijective S-boxes with respect to modular addition (Q2040306) (← links)
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 (Q2055608) (← links)
- Improving key-recovery in linear attacks: application to 28-round PRESENT (Q2055609) (← links)
- Tight security bounds for double-block hash-then-sum MACs (Q2055619) (← links)
- Fault template attacks on block ciphers exploiting fault propagation (Q2055630) (← links)
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles (Q2057178) (← links)
- A chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) letters (Q2065338) (← links)
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (Q2068387) (← links)
- A note on the signal-to-noise ratio of \((n, m)\)-functions (Q2085718) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light (Q2102070) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Thinking outside the superbox (Q2129002) (← links)
- Resilient uniformity: applying resiliency in masking (Q2130025) (← links)
- An STP-based model toward designing S-boxes with good cryptographic properties (Q2132443) (← links)
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study (Q2145286) (← links)
- Automatic search for bit-based division property (Q2146095) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- Transparency order of \((n, m)\)-functions -- its further characterization and applications (Q2154041) (← links)
- \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security (Q2154057) (← links)
- MILP based differential attack on round reduced WARP (Q2154058) (← links)
- Differential uniformity and linearity of S-boxes by multiplicative complexity (Q2154885) (← links)
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis (Q2170083) (← links)
- On the relationship between resilient Boolean functions and linear branch number of S-boxes (Q2179400) (← links)
- Exploring lightweight efficiency of ForkAES (Q2179412) (← links)
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (Q2182076) (← links)
- Blockcipher-based authenticated encryption: how small can we go? (Q2188958) (← links)
- Some group-theoretical results on Feistel networks in a long-key scenario (Q2210647) (← links)
- On the efficiency of solving Boolean polynomial systems with the characteristic set method (Q2211189) (← links)
- On properties of translation groups in the affine general linear group with applications to cryptography (Q2216563) (← links)
- The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions (Q2217498) (← links)
- Troika: a ternary cryptographic hash function (Q2285779) (← links)
- Improbable differential attacks on \texttt{PRESENT} using undisturbed bits (Q2349623) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- Survey of information security (Q2385398) (← links)
- Side-channel cryptographic attacks using pseudo-Boolean optimization (Q2398519) (← links)
- Differential-linear cryptanalysis revisited (Q2408590) (← links)
- Differential property of \textsc{Present}-like structure (Q2413209) (← links)
- Type-preserving matrices and security of block ciphers (Q2415388) (← links)
- Beyond-birthday secure domain-preserving PRFs from a single permutation (Q2416937) (← links)
- Constructing infinite families of low differential uniformity (\(n,m\))-functions with \(m>n/2\) (Q2420471) (← links)
- On unbalanced feistel networks with contracting MDS diffusion (Q2430700) (← links)
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard (Q2446578) (← links)
- Perfect nonlinear functions and cryptography (Q2512886) (← links)
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy (Q2629990) (← links)
- On full differential uniformity of permutations on the ring of integers modulo \(n\) (Q2689920) (← links)