<s>
Its	O
most	O
notable	O
feature	O
is	O
the	O
alpha	B-Algorithm
reflection	I-Algorithm
:	O
the	O
decryption	O
is	O
the	O
encryption	O
with	O
a	O
related	O
key	O
which	O
is	O
very	O
cheap	O
to	O
compute	O
.	O
</s>
<s>
As	O
a	O
result	O
,	O
fully	O
unrolled	O
implementation	O
are	O
able	O
to	O
reach	O
much	O
higher	O
frequencies	O
than	O
AES	B-Algorithm
or	O
PRESENT	B-Algorithm
.	O
</s>
<s>
According	O
to	O
the	O
authors	O
,	O
for	O
the	O
same	O
time	O
constraints	O
and	O
technologies	O
,	O
PRINCE	O
uses	O
6	O
–	O
7	O
times	O
less	O
area	O
than	O
PRESENT-80	O
and	O
14	O
–	O
15	O
times	O
less	O
area	O
than	O
AES-128	B-Algorithm
.	O
</s>
<s>
The	O
nonlinear	O
layer	O
is	O
based	O
on	O
a	O
single	O
4-bit	O
S-box	B-Algorithm
which	O
can	O
be	O
chosen	O
among	O
the	O
affine-equivalent	O
of	O
8	O
specified	O
S-boxes	B-Algorithm
.	O
</s>
<s>
The	O
linear	O
layer	O
consists	O
of	O
multiplication	O
by	O
a	O
64x64	O
matrix	O
and	O
a	O
shift	O
row	O
similar	O
to	O
the	O
one	O
in	O
AES	B-Algorithm
but	O
operating	O
on	O
4-bit	O
nibbles	O
rather	O
than	O
bytes	O
.	O
</s>
<s>
The	O
paper	O
argues	O
that	O
the	O
FX	O
construction	O
is	O
a	O
fine	O
solution	O
to	O
improve	O
the	O
security	O
of	O
a	O
widely	O
deployed	O
cipher	O
(	O
like	O
DES-X	B-Algorithm
did	O
for	O
DES	B-Algorithm
)	O
but	O
that	O
it	O
is	O
a	O
questionable	O
choice	O
for	O
new	O
designs	O
.	O
</s>
<s>
The	O
paper	O
"	O
Reflection	O
Cryptanalysis	O
of	O
PRINCE-Like	O
Ciphers	O
"	O
focuses	O
on	O
the	O
alpha	B-Algorithm
reflection	I-Algorithm
and	O
establishes	O
choice	O
criteria	O
for	O
the	O
alpha	O
constant	O
.	O
</s>
