PRINCE
From MaRDI portal
swMATH13240MaRDI QIDQ25155FDOQ25155
Author name not available (Why is that?)
Official website: http://link.springer.com/chapter/10.1007/978-3-642-34961-4_14
Cited In (only showing first 100 items - show all)
- Involutory differentially 4-uniform permutations from known constructions
- Remus
- RoadRunneR
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- PRINCEv2. More security for (almost) no overhead
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Cryptanalysis of KLEIN
- QARMA
- Romulus
- Blockcipher-based authenticated encryption: how small can we go?
- Blockcipher-based authenticated encryption: how small can we go?
- Practical cryptanalysis of full Sprout with TMD tradeoff attacks
- Construction of lightweight S-boxes using Feistel and MISTY structures
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Observations on the \textsf{SIMON} block cipher family
- Implementing lightweight block ciphers on \texttt{x86} architectures
- Exploring energy efficiency of lightweight block ciphers
- Atomic-AES: a compact implementation of the AES encryption/decryption core
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY
- Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes
- Reflection cryptanalysis of PRINCE-like ciphers
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Trivium
- LBlock
- Whirlwind
- ARIA
- KLEIN
- ARMADILLO
- PRESENT
- HIGHT
- spongent
- AEGIS
- Camellia
- mCrypton
- NOEKEON
- Keccak
- TWINE
- RevLib
- EPCBC
- PHOTON
- ICEBERG
- NanGate
- Piccolo
- FOX
- Whirlpool
- SIMECK
- SIMON
- Twofish
- KTANTAN
- Midori
- SKINNY
- Espresso
- Atomic-AES
- LED
- Itubee
- Grain
- Lilliput
- SHIELD
- ELmD
- MANTIS
- PICARO
- KATAN
- MISTY
- CHAM
- LEA
- PRINTcipher
- Square
- ATHENa
- LowMC
- SPECK
- AKF: a key alternating Feistel scheme for lightweight cipher designs
- TEA
- GIFT
- bitslice-masking-multiplication
- Revised version of block cipher CHAM
- Cryptanalysis of iterated Even-Mansour schemes with two keys
- On the security of Piccolo lightweight block cipher against related-key impossible differentials
- Espresso: a stream cipher for 5G wireless communication systems
- Generic key recovery attack on Feistel scheme
- Reflection ciphers
- Redefining the transparency order
- Perfect nonlinear functions and cryptography
- CHAM: a family of lightweight block ciphers for resource-constrained devices
- Gimli
- CRAFT
- Truncated differential based known-key attacks on round-reduced SIMON
- Orthros
- LLLWBC
- Differential attacks: using alternative operations
- A survey on implementation of lightweight block ciphers for resource constraints devices
- On the constructions of \(n\)-cycle permutations
- PRINCE: accurate approximation of the copy number of tandem repeats
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Two-to-one mappings and involutions without fixed points over \(\mathbb{F}_{2^n}\)
This page was built for software: PRINCE