@article{MVK_2013_4_2_a9,
author = {M. A. Pudovkina and G. I. Khoruzenko},
title = {On classes of weak keys of generalized cryptosystem {PRINT}},
journal = {Matemati\v{c}eskie voprosy kriptografii},
pages = {113--125},
year = {2013},
volume = {4},
number = {2},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a9/}
}
M. A. Pudovkina; G. I. Khoruzenko. On classes of weak keys of generalized cryptosystem PRINT. Matematičeskie voprosy kriptografii, Tome 4 (2013) no. 2, pp. 113-125. http://geodesic.mathdoc.fr/item/MVK_2013_4_2_a9/
[1] Knudsen L., Leander G., Poschmann A., Robshaw M. J. B., “PRINTcipher: A block cipher for ICPrinting”, CHES-2010, Lect. Notes Comput. Sci., 6225, 2010, 16–32 | DOI
[2] Bogdanov A., Knudsen L. R., Leander G., Paar C., Poschmann A., Robshaw M. J. B., Seurin Y., Vikkelsoe C., “PRESENT – An ultra-lightweight block cipher”, CHES-2007, Lect. Notes Comput. Sci., 4727, 2007, 450–466 | DOI | Zbl
[3] Leander G., Abdelraheem M. A., AlKhzaimi H., Zenner E., “A Cryptanalysis of PRINTcipher: The invariant coset attack”, CRYPTO-2011, Lect. Notes Comput. Sci., 6841, 2011, 206–221 | DOI | MR | Zbl
[4] Bulygin S., Walter M., Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery, , 2012 http://eprint.iacr.org/2012
[5] Abdelraheem M. A., Leander G., Zenner E., “Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations”, FSE-2011, Lect. Notes Comput. Sci., 6733, 2011, 1–17 | DOI | MR
[6] Agren M., Johansson T., “Linear Cryptanalysis of PRINTcipher – trails and samples everywhere”, INDOCRYPT-2011, Lect. Notes Comput. Sci., 7107, 2011, 114–133 | DOI | Zbl
[7] Karakoc F., Demirci H., Harmanci A. E., “Combined differential and linear cryptanalysis of reduced-round PRINTcipher”, SAC-2011, Lect. Notes Comput. Sci., 7118, 2011, 169–184 | DOI | MR
[8] Bulygin S., Buchmann J., “Algebraic Cryptanalysis of the round-reduced and side channel analysis of the full PRINTcipher-48”, CANS-2011, Lect. Notes Comput. Sci., 7092, 2011, 54–75 | DOI
[9] Liu B., Gong Z., Qiu W., Zheng D., “On the security of 4-Bit involutive S-Boxes for lightweight designs”, ISPEC-2011, Lect. Notes Comput. Sci., 6672, 2011, 247–256 | DOI | Zbl
[10] Biham E., “On Matsui's linear cryptanalysis”, Eurocrypt' 94, Lect. Notes Comput. Sci., 950, ed. A. De Santis, 1994, 341–355 | DOI | MR