On classes of weak keys of generalized cryptosystem PRINT
Matematičeskie voprosy kriptografii, Tome 4 (2013) no. 2, pp. 113-125 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

The block cipher PRINTcipher was presented at CHES in 2010. In this paper, a generalized PRINT cipher, called GPRINT, is introduced. Weak key classes of GPRINT in relation to invariant coset attacks and linear cryptanalysis are described.
@article{MVK_2013_4_2_a9,
     author = {M. A. Pudovkina and G. I. Khoruzenko},
     title = {On classes of weak keys of generalized cryptosystem {PRINT}},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {113--125},
     year = {2013},
     volume = {4},
     number = {2},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a9/}
}
TY  - JOUR
AU  - M. A. Pudovkina
AU  - G. I. Khoruzenko
TI  - On classes of weak keys of generalized cryptosystem PRINT
JO  - Matematičeskie voprosy kriptografii
PY  - 2013
SP  - 113
EP  - 125
VL  - 4
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a9/
LA  - ru
ID  - MVK_2013_4_2_a9
ER  - 
%0 Journal Article
%A M. A. Pudovkina
%A G. I. Khoruzenko
%T On classes of weak keys of generalized cryptosystem PRINT
%J Matematičeskie voprosy kriptografii
%D 2013
%P 113-125
%V 4
%N 2
%U http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a9/
%G ru
%F MVK_2013_4_2_a9
M. A. Pudovkina; G. I. Khoruzenko. On classes of weak keys of generalized cryptosystem PRINT. Matematičeskie voprosy kriptografii, Tome 4 (2013) no. 2, pp. 113-125. http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a9/

[1] Knudsen L., Leander G., Poschmann A., Robshaw M. J. B., “PRINTcipher: A block cipher for ICPrinting”, CHES-2010, Lect. Notes Comput. Sci., 6225, 2010, 16–32 | DOI

[2] Bogdanov A., Knudsen L. R., Leander G., Paar C., Poschmann A., Robshaw M. J. B., Seurin Y., Vikkelsoe C., “PRESENT – An ultra-lightweight block cipher”, CHES-2007, Lect. Notes Comput. Sci., 4727, 2007, 450–466 | DOI | Zbl

[3] Leander G., Abdelraheem M. A., AlKhzaimi H., Zenner E., “A Cryptanalysis of PRINTcipher: The invariant coset attack”, CRYPTO-2011, Lect. Notes Comput. Sci., 6841, 2011, 206–221 | DOI | MR | Zbl

[4] Bulygin S., Walter M., Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery, , 2012 http://eprint.iacr.org/2012

[5] Abdelraheem M. A., Leander G., Zenner E., “Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations”, FSE-2011, Lect. Notes Comput. Sci., 6733, 2011, 1–17 | DOI | MR

[6] Agren M., Johansson T., “Linear Cryptanalysis of PRINTcipher – trails and samples everywhere”, INDOCRYPT-2011, Lect. Notes Comput. Sci., 7107, 2011, 114–133 | DOI | Zbl

[7] Karakoc F., Demirci H., Harmanci A. E., “Combined differential and linear cryptanalysis of reduced-round PRINTcipher”, SAC-2011, Lect. Notes Comput. Sci., 7118, 2011, 169–184 | DOI | MR

[8] Bulygin S., Buchmann J., “Algebraic Cryptanalysis of the round-reduced and side channel analysis of the full PRINTcipher-48”, CANS-2011, Lect. Notes Comput. Sci., 7092, 2011, 54–75 | DOI

[9] Liu B., Gong Z., Qiu W., Zheng D., “On the security of 4-Bit involutive S-Boxes for lightweight designs”, ISPEC-2011, Lect. Notes Comput. Sci., 6672, 2011, 247–256 | DOI | Zbl

[10] Biham E., “On Matsui's linear cryptanalysis”, Eurocrypt' 94, Lect. Notes Comput. Sci., 950, ed. A. De Santis, 1994, 341–355 | DOI | MR