Abstract: Free Access Appendix 3: PRESENT Christina BOURA, Christina BOURA University of Paris-Saclay, UVSQ, CNRS, Versailles, FranceSearch for more papers by this author Christina BOURA, Christina BOURA University of Paris-Saclay, UVSQ, CNRS, Versailles, FranceSearch for more papers by this author Christina Boura, Christina BouraSearch for more papers by this authorMaría Naya-Plasencia, María Naya-PlasenciaSearch for more papers by this author Book Author(s):Christina Boura, Christina BouraSearch for more papers by this authorMaría Naya-Plasencia, María Naya-PlasenciaSearch for more papers by this author First published: 08 December 2023 https://doi.org/10.1002/9781394256358.app3 AboutPDFPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShareShare a linkShare onEmailFacebookTwitterLinkedInRedditWechat References Blondeau , C. and Nyberg , K. ( 2016 ). Improved parameter estimates for correlation and capacity deviates in linear cryptanalysis . IACR Trans. Symmetric Cryptol. , 2016 ( 2 ), 162 – 191 . Google Scholar Bogdanov , A. , Knudsen , L.R. , Leander , G. , Paar , C. , Poschmann , A. , Robshaw , M.J.B. , Seurin , Y. , Vikkelsoe , C. ( 2007 ). PRESENT: An ultra-lightweight block cipher . In CHES 2007 , vol. 4727 of Lecture Notes in Computer Science , P. Paillier , I. Verbauwhede (eds). Springer . 10.1007/978-3-540-74735-2_31 Web of Science®Google Scholar Bogdanov , A. , Tischhauser , E. , Vejre , P.S. ( 2018 ). Multivariate profiling of hulls for linear cryptanalysis . IACR Trans. Symmetric Cryptol. , 2018 ( 1 ), 101 – 125 . 10.46586/tosc.v2018.i1.101-125 Google Scholar Cho , J.Y. ( 2010 ). Linear cryptanalysis of reduced-round PRESENT . In CT-RSA 2010 , vol. 5985 of Lecture Notes in Computer Science , J. Pieprzyk (ed.). Springer . Google Scholar Collard , B. and Standaert , F. ( 2009 ). A statistical saturation attack against the block cipher PRESENT . In CT-RSA 2009 , vol. 5473 of Lecture Notes in Computer Science , M. Fischlin (ed.). Springer . 10.1007/978-3-642-00862-7_13 Google Scholar Flórez-Gutiérrez , A. and Naya-Plasencia , M. ( 2020 ). Improving key-recovery in linear attacks: Application to 28-round PRESENT . In EUROCRYPT 2020, Part I , vol. 12105 of Lecture Notes in Computer Science , A. Canteaut , Y. Ishai (eds). Springer . 10.1007/978-3-030-45721-1_9 Google Scholar Ohkuma , K. ( 2009 ). Weak keys of reduced-round PRESENT for linear cryptanalysis . In SAC 2009 , vol. 5867 of Lecture Notes in Computer Science , H.J. Jacobson , V. Rijmen , R. Safavi-Naini (eds). Springer . Google Scholar Zheng , L. and Zhang , S. ( 2015 ). Fft-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic . Secur. Commun. Networks , 8 ( 18 ), 3535 – 3545 . 10.1002/sec.1278 Web of Science®Google Scholar Symmetric Cryptography 1: Design and Security Proofs ReferencesRelatedInformation