Security Analysis of PRINCE
From MaRDI portal
Publication:2946873
DOI10.1007/978-3-662-43933-3_6zbMath1321.94066OpenAlexW132386699MaRDI QIDQ2946873
Jérémy Jean, Shuang Wu, Lei Wang, Thomas Peyrin, Ivica Nikolić
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_6
Related Items (5)
PRINCEv2. More security for (almost) no overhead ⋮ Efficient slide attacks ⋮ Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE ⋮ Impossible differential cryptanalysis on reduced-round PRINCEcore ⋮ Reflection ciphers
Cites Work
- Unnamed Item
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Encyclopedia of Cryptography and Security
- Biclique Cryptanalysis of the Full AES
- A cryptanalytic time-memory trade-off
- The block cipher Square
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Advances in Cryptology - EUROCRYPT 2004
- How to protect DES against exhaustive key search (an analysis of DESX).
This page was built for publication: Security Analysis of PRINCE