On the Key Schedule Strength of PRESENT
暂无分享,去创建一个
Jean-Philippe Aumasson | Julio César Hernández Castro | Pedro Peris-Lopez | Pedro Peris-López | Jean-Philippe Aumasson | J. Castro
[1] Meiqin Wang,et al. Differential Cryptanalysis of Reduced-Round PRESENT , 2008, AFRICACRYPT.
[2] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[3] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[4] Andrey Bogdanov,et al. Hash Functions and RFID Tags: Mind the Gap , 2008, CHES.
[5] John A. Clark,et al. Fault Injection and a Timing Channel on an Analysis Technique , 2002, EUROCRYPT.
[6] Serge Vaudenay. Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings , 2008, AFRICACRYPT.
[7] Cihangir Tezcan,et al. Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT , 2009, ACISP.
[8] Lars R. Knudsen,et al. Analysis of Trivium by a Simulated Annealing variant , 2010 .
[9] Willi Meier,et al. Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem , 1999, EUROCRYPT.
[10] Kenji Ohkuma,et al. Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis , 2009, Selected Areas in Cryptography.
[11] Christophe Clavier,et al. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009, CHES.
[12] Marc Fischlin,et al. Topics in Cryptology – CT-RSA 2009 , 2009 .
[13] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[14] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[15] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[16] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[17] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[18] Ross Anderson,et al. Serpent: A Proposal for the Advanced Encryption Standard , 1998 .
[19] Manoj Kumar,et al. Flaws in Differential Cryptanalysis of Reduced Round PRESENT , 2010, IACR Cryptol. ePrint Arch..
[20] Meiqin Wang,et al. Differential Cryptanalysis of Reduced-Round ICEBERG , 2008, AFRICACRYPT.
[21] François-Xavier Standaert,et al. A Statistical Saturation Attack against the Block Cipher PRESENT , 2009, CT-RSA.
[22] Christophe De Cannière,et al. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.
[23] Martin R. Albrecht,et al. Algebraic Techniques in Differential Cryptanalysis , 2009, IACR Cryptol. ePrint Arch..
[24] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.