Results 161 to 170 of about 1,611 (184)
Some of the next articles are maybe not open access.
Algebraic attacks on cipher systems
2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005Recently, algebraic attacks have emerged as a new type of cryptographic attack on block ciphers. These attacks involve the formulation of a system of nonlinear equations that describe the secret keybits in terms of the input and output bits of the block cipher, which is then solved.
openaire +1 more source
Hardware attacks: an algebraic approach
Journal of Cryptographic Engineering, 2016Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the hardware to imitate or understand the system design, to gain access to the system or to obtain encryption keys. They may also try to initiate attacks such as denial of service to disable the services supported by a chip, or reduce
Samer Moein +2 more
openaire +1 more source
Algebraic Attack on HFE Revisited
2008In this paper, we study how the algebraic attack on the HFE multivariate public key cryptosystem works if we build an HFE cryptosystem on a finite field whose characteristic is not two. Using some very basic algebraic geometry we argue that when the characteristic is not two the algebraic attack should not be polynomial in the range of the parameters ...
Jintai Ding +2 more
openaire +1 more source
Algebraic Attacks on Round-Reduced Keccak
2021Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in analyzing the collision resistance and preimage resistance of round-reduced Keccak.
Fukang Liu +3 more
openaire +1 more source
Simplifying algebraic attacks with univariate analysis
2011 Information Theory and Applications Workshop, 2011The purpose of this paper is to present a more fine-grained view on cryptanalysis of stream ciphers based on LFSRs in terms of the univariate representation and to provide some connections to cyclic codes. A usual way of presenting such ciphers is in terms of multivariate equations over GF(2).
Tor Helleseth, Sondre Ronjom
openaire +1 more source
Meeting the Attacks on Algebra
The Mathematics Teacher, 1926No subject in the high school curriculum, according to some educators, has yielded such unsatisfactory results as Algebra. It has been the subject of most severe criticisms on all sides, and has been held responsible for a great deal of freshman mortality. A leading educator of Massachusetts, in one of his public speeches, has expressed the desire that
openaire +1 more source
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks
2014Given a Boolean function with n variables, a revised algorithm for computing the algebraic immunity d against conventional algebraic attacks in O(D 2±e ) complexity is described for \(D=\sum _{i = 0}^d {n \choose i}\) and a small e, which corrects and clarifies the most efficient algorithm so far at Eurocrypt 2006.
Lin Jiao, Bin Zhang, Mingsheng Wang
openaire +1 more source
Chosen IV algebraic attack on One.Fivium
2008 3rd International Conference on Intelligent System and Knowledge Engineering, 2008One of the key questions in algebraic attacks is how to effectively reduce the degree of the function. Based on the algebraic attack, this paper presents a new algorithm of attack - chosen IV algebraic attack, which can reduce the function?s degree by choosing appropriate IV.
Zhe Sun, Shi-Wu Zhang, Lei Wang
openaire +1 more source
Algebraic attack on Mini-AES algorithm
AIP Conference Proceedings, 2016Algebraic attack is a potential powerful attack on symmetric key block cipher. It had been applied on two algorithm of AES simplification; there are Simplified AES and Baby Rijndael. In this research, the application of algebraic attack on Mini-AES algorithm was done to get a polynomial equations system of Mini-AES algorithm and its solutions using XL ...
Sundari Tianingrum, Santi Indarjani
openaire +1 more source
Algebraic Attack Against Trivium
2008Trivium is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate count in hardware, and reasonably efficient software implementation. It was designed in 2005 by C. De Cannière and B. Preneel for the European project eSTREAM.
Simonetti, Ilaria +2 more
openaire +1 more source

