Differential cryptanalysis of PRESENT-like cipher
From MaRDI portal
Publication:494577
DOI10.1007/S10623-014-9965-1zbMATH Open1359.94613OpenAlexW2083898372WikidataQ121364349 ScholiaQ121364349MaRDI QIDQ494577FDOQ494577
Authors: Guo-Qiang Liu, Chenhui Jin
Publication date: 1 September 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-014-9965-1
Recommendations
Cites Work
- IX. On the problem of the most efficient tests of statistical hypotheses
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINTcipher: A Block Cipher for IC-Printing
- Multiple differential cryptanalysis using LLR and \(\chi^2\) statistics
- Multiple differential cryptanalysis: theory and practice
- Multidimensional Extension of Matsui’s Algorithm 2
- Title not available (Why is that?)
- How Far Can We Go Beyond Linear Cryptanalysis?
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- Slender-set differential cryptanalysis
- Title not available (Why is that?)
- Designing cryptographically strong S-boxes with use of 1D cellular automata
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Cryptanalysis of C2
- Differential Cryptanalysis of Reduced-Round PRESENT
- A Statistical Saturation Attack against the Block Cipher PRESENT
- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
- Weak keys of reduced-round PRESENT for linear cryptanalysis
- Title not available (Why is that?)
- On the weak keys of blowfish
- A model for structure attacks, with applications to PRESENT and Serpent
- Title not available (Why is that?)
- Linear cryptanalysis of reduced-round PRESENT
- Structural cryptanalysis of SASAS
Cited In (7)
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- Slender-set differential cryptanalysis
- Speeding up the GVW algorithm via a substituting method
- Yoyo attack on 4-round Lai-Massey scheme with secret round functions
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
- Improved slender-set linear cryptanalysis
Uses Software
This page was built for publication: Differential cryptanalysis of PRESENT-like cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q494577)