Differential cryptanalysis of PRESENT-like cipher
From MaRDI portal
Publication:494577
Recommendations
Cites work
- scientific article; zbMATH DE number 1722688 (Why is no real title available?)
- scientific article; zbMATH DE number 1942441 (Why is no real title available?)
- scientific article; zbMATH DE number 2009946 (Why is no real title available?)
- scientific article; zbMATH DE number 1406793 (Why is no real title available?)
- A Statistical Saturation Attack against the Block Cipher PRESENT
- A model for structure attacks, with applications to PRESENT and Serpent
- Cryptanalysis of C2
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Designing cryptographically strong S-boxes with use of 1D cellular automata
- Differential Cryptanalysis of Reduced-Round PRESENT
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- How Far Can We Go Beyond Linear Cryptanalysis?
- IX. On the problem of the most efficient tests of statistical hypotheses
- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
- Linear cryptanalysis of reduced-round PRESENT
- Multidimensional Extension of Matsui’s Algorithm 2
- Multiple differential cryptanalysis using LLR and \(\chi^2\) statistics
- Multiple differential cryptanalysis: theory and practice
- On the weak keys of blowfish
- PRESENT: An Ultra-Lightweight Block Cipher
- PRINTcipher: A Block Cipher for IC-Printing
- Slender-set differential cryptanalysis
- Structural cryptanalysis of SASAS
- Weak keys of reduced-round PRESENT for linear cryptanalysis
Cited in
(7)- Yoyo attack on 4-round Lai-Massey scheme with secret round functions
- Speeding up the GVW algorithm via a substituting method
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Slender-set differential cryptanalysis
- Improved slender-set linear cryptanalysis
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
This page was built for publication: Differential cryptanalysis of PRESENT-like cipher
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q494577)