PRINCE
From MaRDI portal
Cited in
(only showing first 100 items - show all)- Differential attacks: using alternative operations
- On the constructions of \(n\)-cycle permutations
- Involutory differentially 4-uniform permutations from known constructions
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- A survey on implementation of lightweight block ciphers for resource constraints devices
- Correlation power analysis of lightweight block ciphers: from theory to practice
- PRINCE: accurate approximation of the copy number of tandem repeats
- Two-to-one mappings and involutions without fixed points over \(\mathbb{F}_{2^n}\)
- Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Characterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\)
- Regular complete permutation polynomials over \(\mathbb{F}_{2^n} \)
- Cryptanalysis of KLEIN
- Blockcipher-based authenticated encryption: how small can we go?
- Key alternating ciphers based on involutions
- Blockcipher-based authenticated encryption: how small can we go?
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Observations on the \textsf{SIMON} block cipher family
- Implementing lightweight block ciphers on \texttt{x86} architectures
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY
- On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis
- Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes
- New constructions of involutions over finite fields
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression
- New observations on invariant subspace attack
- Reflection cryptanalysis of PRINCE-like ciphers
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- NESSIE
- CLEFIA
- Trivium
- LBlock
- Whirlwind
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- spongent
- AEGIS
- Camellia
- mCrypton
- NOEKEON
- Keccak
- TWINE
- RevLib
- EPCBC
- PHOTON
- ICEBERG
- NanGate
- Piccolo
- FOX
- Whirlpool
- SIMECK
- SIMON
- Twofish
- KTANTAN
- Midori
- SKINNY
- Espresso
- Atomic-AES
- LED
- Itubee
- Grain
- Lilliput
- SHIELD
- ELmD
- MANTIS
- PICARO
- KATAN
- MISTY
- CHAM
- LEA
- PRINTcipher
- Square
- ATHENa
- LowMC
- SPECK
- TEA
- GIFT
- bitslice-masking-multiplication
- Cryptanalysis of reduced-round SIMON32 and SIMON48
- Cryptanalysis of Feistel networks with secret round functions
- Beyond-birthday secure domain-preserving PRFs from a single permutation
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Nonlinear diffusion layers
- Automatic search of meet-in-the-middle and impossible differential attacks
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- A MAC mode for lightweight block ciphers
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- SAND
This page was built for software: PRINCE