PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications

From MaRDI portal
Publication:4911587

DOI10.1007/978-3-642-34961-4_14zbMath1292.94035OpenAlexW1599175145WikidataQ56933163 ScholiaQ56933163MaRDI QIDQ4911587

Elif Bilge Kavun, Gregor Leander, Julia Borghoff, Ventzislav Nikov, Miroslav Knežević, Peter Rombouts, Tim Güneysu, Søren S. Thomsen, Christian Rechberger, Christof Paar, Anne Canteaut, Tolga Yalçın, Lars R. Knudsen

Publication date: 19 March 2013

Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_14




Related Items (90)

Linear permutations and their compositional inverses over 𝔽qnRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsA new non-random property of 4.5-round PRINCEA survey on implementation of lightweight block ciphers for resource constraints devicesPRINCEv2. More security for (almost) no overheadWARP: revisiting GFN for lightweight 128-bit block cipherLHash: A Lightweight Hash FunctionDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CorePractical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCELinks Among Impossible Differential, Integral and Zero Correlation Linear CryptanalysisCryptanalysis of Full SproutSurvey of information securityTransparency order of \((n, m)\)-functions -- its further characterization and applicationsNew observations on invariant subspace attackConstruction of MDS matrices combining the Feistel, Misty and Lai-Massey schemesNew constructions of involutions over finite fieldsStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionReflection Cryptanalysis of PRINCE-Like CiphersSecurity Analysis of PRINCECUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskBeyond-birthday secure domain-preserving PRFs from a single permutationAn efficient strategy to construct a better differential on multiple-branch-based designs: application to OrthrosXOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computationBlockcipher-based authenticated encryption: how small can we go?Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemMeet-in-the-middle attacks and structural analysis of round-reduced PRINCEFull analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasuresImproved heuristics for low-latency implementations of linear layersEnergy consumption of protected cryptographic hardware cores. An experimental studyFUTURE: a lightweight block cipher using an optimal diffusion matrixCryptanalysis of reduced round SPEEDYA theoretical analysis of generalized invariants of bijective S-boxesMaximal complete permutations over \(\mathbb{F}_2^n \)Side-Channel Analysis Protection and Low-Latency in ActionKey-reduced variants of 3Kf9 with beyond-birthday-bound securityLLLWBC: a new low-latency light-weight block cipherOptimizing the depth of quantum implementations of linear layersRAMus- a new lightweight block cipher for RAM encryptionCategorization of faulty nonce misuse resistant message authenticationThree input exclusive-or gate support for Boyar-Peralta's algorithmAnalyzing masked ciphers against transition and coupling effectsConstructing and deconstructing intentional weaknesses in symmetric ciphersProvably secure reflection ciphersFour by four MDS matrices with the fewest XOR gates based on wordsImpossible differential cryptanalysis on reduced-round PRINCEcoreOn the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxesA new construction for involutions over finite fieldsMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionCryptanalysis of masked ciphers: a not so random ideaThe phantom of differential characteristicsMore constructions of \(n\)-cycle permutationsUnnamed ItemMind the gap -- a closer look at the security of block ciphers against differential cryptanalysisDifferential attacks: using alternative operationsAKF: a key alternating Feistel scheme for lightweight cipher designsA MAC Mode for Lightweight Block CiphersStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionTwo-to-one mappings and involutions without fixed points over \(\mathbb{F}_{2^n}\)Key alternating ciphers based on involutionsEspresso: a stream cipher for 5G wireless communication systemssLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitivesReflection ciphersRedefining the transparency orderTruncated differential based known-key attacks on round-reduced SIMONInvolutory differentially 4-uniform permutations from known constructionsCharacterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\)Analyzing Permutations for AES-like Ciphers: Understanding ShiftRowsBlock cipher invariants as eigenvectors of correlation matricesOn the constructions of \(n\)-cycle permutationsNonlinear diffusion layersPerfect nonlinear functions and cryptographyReflection cryptanalysis of PRINCE-like ciphersPractical Cryptanalysis of Full Sprout with TMD Tradeoff AttacksCryptanalysis of Feistel Networks with Secret Round FunctionsExploring Energy Efficiency of Lightweight Block CiphersConstruction of Lightweight S-Boxes Using Feistel and MISTY StructuresCorrelation Power Analysis of Lightweight Block Ciphers: From Theory to PracticePRINCEThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsAnother View of the Division PropertyThe summation-truncation hybrid: reusing discarded bits for freeCryptanalysis results on spook. Bringing full-round shadow-512 to the lightA Search Strategy to Optimize the Affine Variant Properties of S-BoxesRegular complete permutation polynomials over \(\mathbb{F}_{2^n} \)On a generalization of substitution-permutation networks: the HADES design strategy


Uses Software



This page was built for publication: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications