The resistance of PRESENT-80 against related-key differential attacks
From MaRDI portal
Publication:2016426
DOI10.1007/s12095-013-0096-8zbMath1291.94079DBLPjournals/ccds/EmamiLNPW14OpenAlexW2091044151WikidataQ59484958 ScholiaQ59484958MaRDI QIDQ2016426
Sareh Emami, Huaxiong Wang, Ivica Nikolić, Josef Pieprzyk, San Ling
Publication date: 20 June 2014
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://eprints.qut.edu.au/69322/2/Pieprzyk_authors_draft.pdf
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13--16, 2011. Revised selected papers
- Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Tweaking AES
- The LED Block Cipher
- Piccolo: An Ultra-Lightweight Blockcipher
- Distinguisher and Related-Key Attack on the Full AES-256
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Differential Cryptanalysis of Reduced-Round PRESENT
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- PRESENT: An Ultra-Lightweight Block Cipher
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
- The Wide Trail Design Strategy
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- A Model for Structure Attacks, with Applications to PRESENT and Serpent
- Linear Cryptanalysis of Reduced-Round PRESENT
This page was built for publication: The resistance of PRESENT-80 against related-key differential attacks