{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:35:31Z","timestamp":1725593731989},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219689"},{"type":"electronic","value":"9783642219696"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21969-6_7","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T15:41:28Z","timestamp":1309275688000},"page":"100-116","source":"Crossref","is-referenced-by-count":2,"title":["FPGA Implementation of a Statistical Saturation Attack against PRESENT"],"prefix":"10.1007","author":[{"given":"St\u00e9phanie","family":"Kerckhof","sequence":"first","affiliation":[]},{"given":"Baudoin","family":"Collard","sequence":"additional","affiliation":[]},{"given":"Franc\u0328ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Albrecht, M., Cid, C.: Algebraic techniques in differential cryptanalysis. In: Dunkelman (ed.) [9], pp. 193\u2013208 (2009)","DOI":"10.1007\/978-3-642-03317-9_12"},{"key":"7_CR2","unstructured":"Bailey, D.V., Batina, L., Bernstein, D.J., Birkner, P., Bos, J.W., Chen, H.-C., Cheng, C.-M., Damme, G.: v., Meulenaer, G.d., Perez, L.J.D., Fan, J., G\u00fcneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Niederhagen, R., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L., Herrewege, A.V., Yang, B.-Y.: Breaking ecc2k-130. Cryptology ePrint Archive, Report 2009\/541 (2009), http:\/\/eprint.iacr.org\/"},{"key":"7_CR3","unstructured":"Blondeau, C., G\u00e9rard, B.: Links between theoretical and effective differential probabilities: Experiments on present. Cryptology ePrint Archive, Report 2010\/261 (2010), http:\/\/eprint.iacr.org\/"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-11925-5_21","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"J.Y. Cho","year":"2010","unstructured":"Cho, J.Y.: Linear cryptanalysis of reduced-round present. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 302\u2013317. Springer, Heidelberg (2010)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-00862-7_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"B. Collard","year":"2009","unstructured":"Collard, B., Standaert, F.-X.: A statistical saturation attack against the block cipher present. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 195\u2013210. Springer, Heidelberg (2009)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-13708-2_8","volume-title":"Applied Cryptography and Network Security","author":"B. Collard","year":"2010","unstructured":"Collard, B., Standaert, F.-X.: Multi-trail statistical saturation attacks. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 123\u2013138. Springer, Heidelberg (2010)"},{"key":"7_CR8","unstructured":"Collard, B., Standaert, F.-X.: Experimenting linear cryptanalysis. To appear in Advanced Linear Cryptanalysis (book chapter). IOS Press, Italy (2011)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Fast Software Encryption","year":"2009","unstructured":"Dunkelman, O. (ed.): FSE 2009. LNCS, vol.\u00a05665. Springer, Heidelberg (2009)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-10868-6_8","volume-title":"Cryptography and Coding","author":"B. G\u00e9rard","year":"2009","unstructured":"G\u00e9rard, B., Tillich, J.-P.: On linear cryptanalysis with many linear approximations. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol.\u00a05921, pp. 112\u2013132. Springer, Heidelberg (2009)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Hermelin, M., Cho, J.Y., Nyberg, K.: Multidimensional extension of matsui\u2019s algorithm 2. In: Dunkelman (ed.) [9], pp. 209\u2013227","DOI":"10.1007\/978-3-642-03317-9_13"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45537-X_9","volume-title":"Selected Areas in Cryptography","author":"L. Keliher","year":"2001","unstructured":"Keliher, L., Meijer, H., Tavares, S.E.: Improving the upper bound on the maximum average linear hull probability for rijndael. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 112\u2013128. Springer, Heidelberg (2001)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-44987-6_26","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"L. Keliher","year":"2001","unstructured":"Keliher, L., Meijer, H., Tavares, S.E.: New method for upper bounding the maximum average linear hull probability for spns. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 420\u2013436. Springer, Heidelberg (2001)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-58108-1_26","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1994","unstructured":"Knudsen, L.R.: Practically secure feistel cyphers. In: Anderson, R.J. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 211\u2013221. Springer, Heidelberg (1994)"},{"key":"7_CR15","unstructured":"Kumar, M., Yadav, P., Kumari, M.: Flaws in differential cryptanalysis of reduced round present. Cryptology ePrint Archive, Report 2010\/407 (2010), http:\/\/eprint.iacr.org\/"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11894063_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"S. Kumar","year":"2006","unstructured":"Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking ciphers with copacobana - a cost-optimized parallel code breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 101\u2013118. Springer, Heidelberg (2006)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Leander, G.: On linear hulls, statistical saturation attacks, present and a cryptanalysis of puffin. To Appear in the Proceedings of Eurocrypt 2011 (2011)","DOI":"10.1007\/978-3-642-20465-4_18"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-10433-6_5","volume-title":"Cryptology and Network Security","author":"J. Nakahara","year":"2009","unstructured":"Nakahara, J., Sepehrdad, P., Zhang, B., Wang, M.: Linear (Hull) and algebraic cryptanalysis of the block cipher PRESENT. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 58\u201375. Springer, Heidelberg (2009)"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"K. Nyberg","year":"1995","unstructured":"Nyberg, K.: Linear approximation of block ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 439\u2013444. Springer, Heidelberg (1995)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-05445-7_16","volume-title":"Selected Areas in Cryptography","author":"K. Ohkuma","year":"2009","unstructured":"Ohkuma, K.: Weak keys of reduced-round present for linear cryptanalysis. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 249\u2013265. Springer, Heidelberg (2009)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-02620-1_7","volume-title":"Information Security and Privacy","author":"O. \u00d6zen","year":"2009","unstructured":"\u00d6zen, O., varaci, K., Tezcan, C., Kocair, \u00c7.: Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2009. LNCS, vol.\u00a05594, pp. 90\u2013107. Springer, Heidelberg (2009)"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-68164-9_4","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"M. Wang","year":"2008","unstructured":"Wang, M.: Differential cryptanalysis of reduced-round present. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 40\u201349. Springer, Heidelberg (2008)"},{"key":"7_CR24","unstructured":"Xilinx. Virtex-5 FPGA User Guide (2010), http:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug190.pdf"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-71039-4_23","volume-title":"Fast Software Encryption","author":"M.R. Z\u2019aba","year":"2008","unstructured":"Z\u2019aba, M.R., Raddum, H., Henricksen, M., Dawson, E.: Bit-pattern based integral attack. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 363\u2013381. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21969-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T09:31:54Z","timestamp":1560331914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21969-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219689","9783642219696"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21969-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}