Reflection Cryptanalysis of PRINCE-Like Ciphers
From MaRDI portal
Publication:2946872
Recommendations
- Reflection cryptanalysis of PRINCE-like ciphers
- Reflection Cryptanalysis of Some Ciphers
- Reflection ciphers
- Provably secure reflection ciphers
- Multiple differential cryptanalysis of round-reduced \textsc{PRINCE}
- Cryptanalysis of PRINCE with minimal data
- Practical cryptanalysis of \(k\)-ary \(C^\ast\)
- Cryptanalysis of 2R− Schemes
- Publication:4941862
- scientific article; zbMATH DE number 1302789
Cites work
- scientific article; zbMATH DE number 4033663 (Why is no real title available?)
- Accurate estimates of the data complexity and success probability for various cryptanalyses
- Analytic combinatorics
- Another look at complementation properties
- Continuations: A mathematical semantics for handling full jumps
- Dynamic semantics of plurals \(\mathrm{DPL}_{Q}^{\circledast}\)
- Event in compositional dynamic semantics
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- PRINTcipher: A Block Cipher for IC-Printing
- Reflection Cryptanalysis of Some Ciphers
- The LED block cipher
- The glitch PUF: a new delay-PUF architecture exploiting glitch shapes
Cited in
(8)- Impossible differential cryptanalysis on reduced-round PRINCEcore
- Security analysis of \textsc{Prince}
- Research on the PRINCE algebraic attack
- Reflection cryptanalysis of PRINCE-like ciphers
- Provably secure reflection ciphers
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Reflection ciphers
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
This page was built for publication: Reflection Cryptanalysis of PRINCE-Like Ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946872)