PRESENT
From MaRDI portal
Software:20323
swMATH8313MaRDI QIDQ20323FDOQ20323
Author name not available (Why is that?)
Cited In (only showing first 100 items - show all)
- An STP-based model toward designing S-boxes with good cryptographic properties
- How Fast Can Higher-Order Masking Be in Software?
- The Cryptanalysis of Reduced-Round SMS4
- A note on the signal-to-noise ratio of \((n, m)\)-functions
- Wave-shaped round functions and primitive groups
- Differential attacks: using alternative operations
- Some results on Fruit
- A survey on implementation of lightweight block ciphers for resource constraints devices
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- Improved (related-key) differential cryptanalysis on GIFT
- WARP: revisiting GFN for lightweight 128-bit block cipher
- Minimizing the two-round Even-Mansour cipher
- What is the effective key length for a block cipher: an attack on every practical block cipher
- Speeding up the GVW algorithm via a substituting method
- A MAC Mode for Lightweight Block Ciphers
- Linearly equivalent s-boxes and the division property
- ParTI – Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
- Making the impossible possible
- Regular subgroups with large intersection
- ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware
- On hidden sums compatible with a given block cipher diffusion layer
- Pushing the limits: a very compact and a threshold implementation of AES
- Higher-order masking schemes for S-boxes
- The resistance of PRESENT-80 against related-key differential attacks
- Troika: a ternary cryptographic hash function
- Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard
- On the efficiency of solving Boolean polynomial systems with the characteristic set method
- Towards closing the security gap of Tweak-aNd-Tweak (TNT)
- New observations on invariant subspace attack
- New Links between Differential and Linear Cryptanalysis
- A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
- Exploring Energy Efficiency of Lightweight Block Ciphers
- Cryptographic properties of small bijective S-boxes with respect to modular addition
- Beyond-birthday secure domain-preserving PRFs from a single permutation
- Implementing Lightweight Block Ciphers on x86 Architectures
- Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
- Generalized MitM attacks on full TWINE
- Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited
- A new construction of differentially 4-uniform \((n,n-1)\)-functions
- MRHS solver based on linear algebra and exhaustive search
- The cryptographic power of random selection
- Nonlinear diffusion layers
- Lower bounds on the degree of block ciphers
- Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption
- Primitivity of PRESENT and other lightweight ciphers
- Fault template attacks on block ciphers exploiting fault propagation
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- Cryptanalysis results on spook. Bringing full-round shadow-512 to the light
- A Key to Success
- Some group-theoretical results on Feistel networks in a long-key scenario
- A single-key attack on the full GOST block cipher
- Design and analysis of small-state grain-like stream ciphers
- A chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) letters
- SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
- Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Security Evaluation Against Side-Channel Analysis at Compilation Time
- There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
- On the multiplicative complexity of Boolean functions and bitsliced higher-order masking
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- A First-Order SCA Resistant AES Without Fresh Randomness
- Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
- Another View of the Division Property
- A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile—and Why It Is Not
- A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box
- О классах слабых ключей обобщенной шифрсистемы PRINT
- SPEEDY on Cortex-M3: efficient software implementation of SPEEDY on ARM Cortex-M3
- The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions
- Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix
- Improved security analysis for nonce-based enhanced hash-then-mask MACs
- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
- Type-preserving matrices and security of block ciphers
- BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
- Cryptanalysis of the light-weight cipher A2U2
- Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications
- Constructing TI-friendly substitution boxes using shift-invariant permutations
- Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
- Threshold Implementation in Software
- Thinking outside the superbox
- Resilient uniformity: applying resiliency in masking
- Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
- Polynomial Evaluation and Side Channel Analysis
- \textsf{Transform} without \textsf{encode} is not sufficient for SIFA and FTA security: a case study
- Automatic search for bit-based division property
- Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
- An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial
- Bitsliced Masking and ARM: Friends or Foes?
- Affine Equivalence and Its Application to Tightening Threshold Implementations
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- Protection measurements of computer network information security for big data
- Hiding Higher-Order Side-Channel Leakage
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
- Pen and Paper Arguments for SIMON and SIMON-like Designs
- PRESENT Runs Fast
- Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts
- On the Multi-output Filtering Model and Its Applications
- Designing Low-Cost Cryptographic Hardware for Wired- or Wireless Point-to-Point Connections
- О разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановках
- Biclique Attack of Block Cipher SKINNY
This page was built for software: PRESENT