Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
From MaRDI portal
Publication:3648465
DOI10.1007/978-3-642-10433-6_5zbMATH Open1287.94088OpenAlexW1588259322MaRDI QIDQ3648465FDOQ3648465
Meiqin Wang, Pouyan Sepehrdad, Jorge jun. Nakahara, Bingsheng Zhang
Publication date: 26 November 2009
Published in: Cryptology and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10433-6_5
Cites Work
Cited In (8)
- FPGA Implementation of a Statistical Saturation Attack against PRESENT
- The resistance of PRESENT-80 against related-key differential attacks
- Title not available (Why is that?)
- A Higher Order Key Partitioning Attack with Application to LBlock
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis
- Differential cryptanalysis of PRESENT-like cipher
- Multiple Differential Cryptanalysis: Theory and Practice
Uses Software
This page was built for publication: Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3648465)