Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
From MaRDI portal
Publication:3648465
DOI10.1007/978-3-642-10433-6_5zbMATH Open1287.94088OpenAlexW1588259322MaRDI QIDQ3648465FDOQ3648465
Authors: Jorge jun. Nakahara, Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang
Publication date: 26 November 2009
Published in: Cryptology and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10433-6_5
Recommendations
- Linear cryptanalysis of reduced-round PRESENT
- Differential Cryptanalysis of Reduced-Round PRESENT
- Weak keys of reduced-round PRESENT for linear cryptanalysis
- On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN
- Linear cryptanalysis using multiple linear approximations
Cites Work
Cited In (21)
- Linear cryptanalysis of reduced-round PRESENT
- Improved integral attacks on PRESENT-80
- A higher order key partitioning attack with application to LBlock
- Block ciphers -- focus on the linear layer (feat. PRIDE)
- Algebraic cryptanalysis of \textsf{Present} based on the method of syllogisms
- Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
- Linear distinguishers in the key-less setting: application to PRESENT
- The resistance of PRESENT-80 against related-key differential attacks
- Title not available (Why is that?)
- Differential Cryptanalysis of Reduced-Round PRESENT
- Estimating the probabilities of low-weight differential and linear approximations on PRESENT-like ciphers
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN
- Multiple differential cryptanalysis: theory and practice
- Differential cryptanalysis of PRESENT-like cipher
- Linear cryptanalysis of reduced-round ICEBERG
- An enhanced binary characteristic set algorithm and its applications to algebraic cryptanalysis
- Linear cryptanalysis of the PP-1 and PP-2 block ciphers
- FPGA implementation of a statistical saturation attack against PRESENT
- Integral attacks on reduced-round PRESENT
- Weak keys of reduced-round PRESENT for linear cryptanalysis
Uses Software
This page was built for publication: Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3648465)