Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
From MaRDI portal
Publication:404952
Recommendations
- Many weak keys for PRINTcipher: fast key recovery and countermeasures
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- On classes of weak keys of generalized cryptosystem PRINT
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
Cites work
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Algebraic Cryptanalysis
- Algebraic aspects of the advanced encryption standard.
- Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
- Bivium as a mixed-integer linear programming problem
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- EPCBC -- a block cipher suitable for electronic product code encryption
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
- LBlock: a lightweight block cipher
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- Many weak keys for PRINTcipher: fast key recovery and countermeasures
- On unbalanced feistel networks with contracting MDS diffusion
- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
- PRINTcipher: A Block Cipher for IC-Printing
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- The LED block cipher
Cited in
(9)- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- On the resilience of Even-Mansour to invariant permutations
- A new non-random property of 4.5-round PRINCE
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Many weak keys for PRINTcipher: fast key recovery and countermeasures
- On classes of weak keys of generalized cryptosystem PRINT
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
Describes a project that uses
Uses Software
This page was built for publication: Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q404952)