PRINTcipher: a block cipher for IC-printing. In this paper we consider some cryptographic implications of integrated circuit (IC) printing. While still in its infancy, IC-printing allows the production and personalisation of circuits at very low cost. In this paper we present two block ciphers PRINTcipher-48 and PRINTcipher-96 that are designed to exploit the properties of IC-printing technology and we further extend recent advances in lightweight block cipher design.

References in zbMATH (referenced in 29 articles )

Showing results 1 to 20 of 29.
Sorted by year (citations)

1 2 next

  1. Banik, Subhadeep; Bao, Zhenzhen; Isobe, Takanori; Kubo, Hiroyasu; Liu, Fukang; Minematsu, Kazuhiko; Sakamoto, Kosei; Shibata, Nao; Shigeri, Maki: WARP: revisiting GFN for lightweight 128-bit block cipher (2021)
  2. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  3. Wang, Bolin; Song, Chan; Wu, Wenling; Zhang, Lei: A new non-random property of 4.5-round PRINCE (2021)
  4. Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan: Revised version of block cipher CHAM (2020)
  5. Boura, Christina; Canteaut, Anne; Jean, Jérémy; Suder, Valentin: Two notions of differential equivalence on Sboxes (2019)
  6. Civino, Roberto; Blondeau, Céline; Sala, Massimiliano: Differential attacks: using alternative operations (2019)
  7. Koo, Bonwook; Roh, Dongyoung; Kim, Hyeonjin; Jung, Younghoon; Lee, Dong-Geon; Kwon, Daesung: CHAM: a family of lightweight block ciphers for resource-constrained devices (2018)
  8. Liu, Yunwen; Rijmen, Vincent: New observations on invariant subspace attack (2018)
  9. Journault, Anthony; Standaert, François-Xavier; Varici, Kerem: Improving the security and efficiency of block ciphers based on LS-designs (2017)
  10. Wu, Teng; Tan, Yin; Mandal, Kalikinkar; Gong, Guang: On the multi-output filtering model and its applications (2017)
  11. Moradi, Amir; Schneider, Tobias: Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori (2016)
  12. Tan, Yin; Gong, Guang; Zhu, Bo: Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (2016)
  13. Bilgin, Begül; Nikova, Svetla; Nikov, Ventzislav; Rijmen, Vincent; Tokareva, Natalia; Vitkup, Valeriya: Threshold implementations of small S-boxes (2015)
  14. Karakoç, F.; Demirci, H.; Harmancı, A. E.: AKF: a key alternating Feistel scheme for lightweight cipher designs (2015)
  15. Liu, Guo-Qiang; Jin, Chen-Hui: Differential cryptanalysis of PRESENT-like cipher (2015)
  16. Soleimany, Hadi; Blondeau, Céline; Yu, Xiaoli; Wu, Wenling; Nyberg, Kaisa; Zhang, Huiling; Zhang, Lei; Wang, Yanfeng: Reflection cryptanalysis of PRINCE-like ciphers (2015)
  17. Bulygin, Stanislav; Walter, Michael; Buchmann, Johannes: Full analysis of \textscPRINTcipherwith respect to invariant subspace attack: efficient key recovery and countermeasures (2014)
  18. Tezcan, Cihangir: Improbable differential attacks on \textttPRESENTusing undisturbed bits (2014)
  19. Zhu, Bo; Gong, Guang: Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 (2014)
  20. Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Slender-set differential cryptanalysis (2013)

1 2 next