搜索结果: 1-15 共查到“密码学 PRESENT-like”相关记录24条 . 查询时间(0.281 秒)
Threshold Implementation in Software - Case Study of PRESENT
Side-Channel Analysis Boolean masking Threshold Implementation
2018/3/6
Masking is one of the predominantly deployed countermeasures in order to prevent side-channel analysis (SCA) attacks. Over the years, various masking schemes have been proposed. However, the implement...
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers
DFA DPA PRESENT
2017/11/13
We present the first practically realizable side-channel assisted fault attack on PRESENT, that can retrieve the last round key efficiently using single nibble faults. The attack demonstrates how side...
Automated Fault Analysis of Assembly Code (With a Case Study on PRESENT Implementation)
automated fault attack software implementations assembly code
2017/9/1
Fault injection attack models are normally determined by analyzing the cipher structure and finding exploitable spots in non-linear and diffusion layers. However, this level of abstraction is often to...
In this article, we revisit the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design u...
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
Bit-serial implementations bit-slide lightweight cryptography
2017/6/26
Area minimization is one of the main efficiency criterion for lightweight encryption primitives. While reducing the implementation data path is a natural strategy for achieving this goal, Substitution...
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
PRESENT PRINCE KATAN64
2016/12/8
This paper presents high-throughput assembly implementations of PRESENT,
PRINCE and KATAN64 ciphers for the ATtiny family of AVR microcontrollers. We report
new throughput records, achieving the spe...
Multivariate Linear Cryptanalysis: The Past and Future of PRESENT
linear cryptanalysis multivariate multidimensional cryptanalysis
2016/7/4
Extensions of linear cryptanalysis making use of multiple
approximations such as multidimensional linear cryptanalysis are an
important tool in symmetric-key cryptanalysis, among others being respon...
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT
symmetric ciphers PRESENT SPONGENT
2016/3/4
At Crypto 2015, Blondeau et al. showed a known-key analysis on the full PRESENT
lightweight block cipher. Based on some of the best differential distinguishers, they introduced
a meet in the middle ...
In this paper we present the first biclique cryptanalysis of MIBS block cipher
and a new biclique cryptanalysis of PRESENT block cipher. These attacks are
performed on full-round MIBS-80 and full-ro...
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
4-bit S-box classification block cipher
2015/12/30
In this paper, we present a new classification of 4-bit optimal S-boxes. All optimal 4-bit Sboxes
can be classified into 183 different categories, among which we specify 3 platinum categories.
Under...
In this article, we analyse the known-key security of the standardized
PRESENT lightweight block cipher. Namely, we propose a knownkey
distinguisher on the full PRESENT, both 80- and 128-bit key ver...
Linear Distinguishers in the Key-less Setting: Application to PRESENT
hash function block cipher linear cryptanalysis
2015/12/23
The application of the concept of linear cryptanalysis to the
domain of key-less primitives is largely an open problem. In this paper we,
for the first time, propose a model in which its application...
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others
Mixed-integer Linear Programming Logical condition modelling
2014/3/6
Since AES and PRESENT are two international standard block ciphers representing the most elegant design strategies for byte-oriented and bit-oriented designs respectively, we regard AES and PRES\-ENT ...
The Resistance of PRESENT-80 Against Related-Key Differential Attacks
secret-key cryptography
2014/3/10
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that no related-key differential charact...
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --
Public Key Cryptosystem Error-Correcting Code
2014/3/12
In this paper, we present a new class of public key cryptosystem based on Reed-Solomon codes, a member of the code based PKC(CBPKC), referred to as K(XII)SE(1)PKC. We show that K(XII)SE(1)PKC can be s...