PRESENT

PRESENT is a new ultra lightweight block cipher algorithm, developed by the Orange Labs (France), Ruhr University Bochum (Germany) and the Technical University of Denmark. PRESENT is designed by Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. It is one of the most compact encryption methods ever designed and is 2.5 times smaller than AES (Advanced Encryption Standard).[1] The block size is 64 bits and the key size can be 80 bit or 128 bit. It is intended to be used in situations where low-power consumption and high chip efficiency is desired. The International Organization for Standardization and the International Electrotechnical Commission included PRESENT in the new international standard for lightweight cryptographic methods


References in zbMATH (referenced in 179 articles , 1 standard article )

Showing results 81 to 100 of 179.
Sorted by year (citations)
  1. Goudarzi, Dahmun; Rivain, Matthieu: On the multiplicative complexity of Boolean functions and bitsliced higher-order masking (2016)
  2. Guo, Chun; Lin, Dongdai: Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (2016)
  3. Kozhevnikov, A. A.; Polikarpov, S. V.; Rumyantsev, K. E.: On differential properties of a symmetric cryptoalgorithm based on pseudo-dynamic substitutions (2016)
  4. Lin, Li; Wu, Wenling; Zheng, Yafei: Automatic search for key-bridging technique: applications to LBlock and TWINE (2016)
  5. Liu, Meicheng; Sim, Siang Meng: Lightweight MDS generalized circulant matrices (2016)
  6. Luykx, Atul; Preneel, Bart; Tischhauser, Elmar; Yasuda, Kan: A MAC mode for lightweight block ciphers (2016)
  7. Maghrebi, Houssem; Servant, Victor; Bringer, Julien: There is wisdom in harnessing the strengths of your enemy: customized encoding to thwart side-channel attacks (2016)
  8. Moradi, Amir; Schneider, Tobias: Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori (2016)
  9. Oren, Yossef; Wool, Avishai: Side-channel cryptographic attacks using pseudo-Boolean optimization (2016)
  10. Picek, Stjepan; Yang, Bohan; Mentens, Nele: A search strategy to optimize the affine variant properties of S-boxes (2016)
  11. Sasdrich, Pascal; Moradi, Amir; Güneysu, Tim: Affine equivalence and its application to tightening threshold implementations (2016)
  12. Schneider, Tobias; Moradi, Amir; Güneysu, Tim: ParTI -- towards combined hardware countermeasures against side-channel and fault-injection attacks (2016)
  13. Tan, Yin; Gong, Guang; Zhu, Bo: Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (2016)
  14. Tezcan, Cihangir; Selçuk, Ali Aydın: Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited (2016)
  15. Tolba, Mohamed; Youssef, Amr M.: Generalized MitM attacks on full TWINE (2016)
  16. Xiang, Zejun; Zhang, Wentao; Bao, Zhenzhen; Lin, Dongdai: Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers (2016)
  17. Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis: The \textscSimonand \textscSpeckblock ciphers on AVR 8-bit microcontrollers (2015)
  18. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  19. Blondeau, Céline; Peyrin, Thomas; Wang, Lei: Known-key distinguisher on full (\mathttPRESENT) (2015)
  20. Carlet, Claude; Alsalami, Yousuf: A new construction of differentially 4-uniform ((n,n-1))-functions (2015)