PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
From MaRDI portal
Publication:4911587
DOI10.1007/978-3-642-34961-4_14zbMath1292.94035OpenAlexW1599175145WikidataQ56933163 ScholiaQ56933163MaRDI QIDQ4911587
Elif Bilge Kavun, Gregor Leander, Julia Borghoff, Ventzislav Nikov, Miroslav Knežević, Peter Rombouts, Tim Güneysu, Søren S. Thomsen, Christian Rechberger, Christof Paar, Anne Canteaut, Tolga Yalçın, Lars R. Knudsen
Publication date: 19 March 2013
Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_14
Related Items (90)
Linear permutations and their compositional inverses over 𝔽qn ⋮ Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ A new non-random property of 4.5-round PRINCE ⋮ A survey on implementation of lightweight block ciphers for resource constraints devices ⋮ PRINCEv2. More security for (almost) no overhead ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ LHash: A Lightweight Hash Function ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core ⋮ Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE ⋮ Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis ⋮ Cryptanalysis of Full Sprout ⋮ Survey of information security ⋮ Transparency order of \((n, m)\)-functions -- its further characterization and applications ⋮ New observations on invariant subspace attack ⋮ Construction of MDS matrices combining the Feistel, Misty and Lai-Massey schemes ⋮ New constructions of involutions over finite fields ⋮ Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression ⋮ Reflection Cryptanalysis of PRINCE-Like Ciphers ⋮ Security Analysis of PRINCE ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ Beyond-birthday secure domain-preserving PRFs from a single permutation ⋮ An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros ⋮ XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation ⋮ Blockcipher-based authenticated encryption: how small can we go? ⋮ Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem ⋮ Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE ⋮ Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures ⋮ Improved heuristics for low-latency implementations of linear layers ⋮ Energy consumption of protected cryptographic hardware cores. An experimental study ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ Cryptanalysis of reduced round SPEEDY ⋮ A theoretical analysis of generalized invariants of bijective S-boxes ⋮ Maximal complete permutations over \(\mathbb{F}_2^n \) ⋮ Side-Channel Analysis Protection and Low-Latency in Action ⋮ Key-reduced variants of 3Kf9 with beyond-birthday-bound security ⋮ LLLWBC: a new low-latency light-weight block cipher ⋮ Optimizing the depth of quantum implementations of linear layers ⋮ RAMus- a new lightweight block cipher for RAM encryption ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ Three input exclusive-or gate support for Boyar-Peralta's algorithm ⋮ Analyzing masked ciphers against transition and coupling effects ⋮ Constructing and deconstructing intentional weaknesses in symmetric ciphers ⋮ Provably secure reflection ciphers ⋮ Four by four MDS matrices with the fewest XOR gates based on words ⋮ Impossible differential cryptanalysis on reduced-round PRINCEcore ⋮ On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes ⋮ A new construction for involutions over finite fields ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Beyond birthday bound secure fresh rekeying: application to authenticated encryption ⋮ Cryptanalysis of masked ciphers: a not so random idea ⋮ The phantom of differential characteristics ⋮ More constructions of \(n\)-cycle permutations ⋮ Unnamed Item ⋮ Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis ⋮ Differential attacks: using alternative operations ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression ⋮ Two-to-one mappings and involutions without fixed points over \(\mathbb{F}_{2^n}\) ⋮ Key alternating ciphers based on involutions ⋮ Espresso: a stream cipher for 5G wireless communication systems ⋮ sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives ⋮ Reflection ciphers ⋮ Redefining the transparency order ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ Involutory differentially 4-uniform permutations from known constructions ⋮ Characterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\) ⋮ Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows ⋮ Block cipher invariants as eigenvectors of correlation matrices ⋮ On the constructions of \(n\)-cycle permutations ⋮ Nonlinear diffusion layers ⋮ Perfect nonlinear functions and cryptography ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks ⋮ Cryptanalysis of Feistel Networks with Secret Round Functions ⋮ Exploring Energy Efficiency of Lightweight Block Ciphers ⋮ Construction of Lightweight S-Boxes Using Feistel and MISTY Structures ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ PRINCE ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Another View of the Division Property ⋮ The summation-truncation hybrid: reusing discarded bits for free ⋮ Cryptanalysis results on spook. Bringing full-round shadow-512 to the light ⋮ A Search Strategy to Optimize the Affine Variant Properties of S-Boxes ⋮ Regular complete permutation polynomials over \(\mathbb{F}_{2^n} \) ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
Uses Software
This page was built for publication: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications