The following pages link to PRESENT (Q20323):
Displayed 50 items.
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (Q269576) (← links)
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- Biclique cryptanalysis of LBlock and TWINE (Q396619) (← links)
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures (Q404952) (← links)
- On weakly APN functions and 4-bit S-boxes (Q413552) (← links)
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock (Q456064) (← links)
- AKF: a key alternating Feistel scheme for lightweight cipher designs (Q477688) (← links)
- Differential cryptanalysis of PRESENT-like cipher (Q494577) (← links)
- On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion (Q503549) (← links)
- Espresso: a stream cipher for 5G wireless communication systems (Q505077) (← links)
- Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity (Q510448) (← links)
- Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (Q510482) (← links)
- A new counting method to bound the number of active S-boxes in Rijndael and 3D (Q522208) (← links)
- Truncated differential based known-key attacks on round-reduced SIMON (Q522222) (← links)
- Switchings, extensions, and reductions in central digraphs (Q549248) (← links)
- Secure hardware implementation of nonlinear functions in the presence of glitches (Q656517) (← links)
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Revised version of block cipher CHAM (Q776328) (← links)
- Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups (Q821312) (← links)
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations (Q831640) (← links)
- Improved (related-key) differential cryptanalysis on GIFT (Q832340) (← links)
- WARP: revisiting GFN for lightweight 128-bit block cipher (Q832383) (← links)
- On some block ciphers and imprimitive groups (Q843945) (← links)
- What is the effective key length for a block cipher: an attack on every practical block cipher (Q893734) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- Generalized MitM attacks on full TWINE (Q894457) (← links)
- Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited (Q894458) (← links)
- A new construction of differentially 4-uniform \((n,n-1)\)-functions (Q895007) (← links)
- On hidden sums compatible with a given block cipher diffusion layer (Q1625795) (← links)
- CHAM: a family of lightweight block ciphers for resource-constrained devices (Q1641163) (← links)
- New observations on invariant subspace attack (Q1653027) (← links)
- On the multiplicative complexity of Boolean functions and bitsliced higher-order masking (Q1695993) (← links)
- Wave-shaped round functions and primitive groups (Q1726011) (← links)
- Differential attacks: using alternative operations (Q1727339) (← links)
- Some results on Fruit (Q1727353) (← links)
- Speeding up the GVW algorithm via a substituting method (Q1730310) (← links)
- Making the impossible possible (Q1747659) (← links)
- Design and analysis of small-state grain-like stream ciphers (Q1749794) (← links)
- Cellular automata based S-boxes (Q1755184) (← links)
- A note on some algebraic trapdoors for block ciphers (Q1784991) (← links)
- MRHS solver based on linear algebra and exhaustive search (Q1787192) (← links)
- Nonlinear diffusion layers (Q1791664) (← links)
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers (Q1934241) (← links)
- Slender-set differential cryptanalysis (Q1946602) (← links)
- A single-key attack on the full GOST block cipher (Q1946603) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- Linearly equivalent s-boxes and the division property (Q2004975) (← links)
- Regular subgroups with large intersection (Q2009075) (← links)
- The resistance of PRESENT-80 against related-key differential attacks (Q2016426) (← links)