Results 11 to 20 of about 1,611 (184)

Practical Cube Attack against Nonce-Misused Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin   +2 more
doaj   +1 more source

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks [PDF]

open access: yes, 2006
In this paper we propose several efficient algorithms for assessing the resistance of Boolean functions against algebraic and fast algebraic attacks when implemented in LFSR-based stream ciphers. An algorithm is described which permits to compute the algebraic immunity d of a Boolean function with n variables in $\mathcal{O}(D^2)$ operations, for $D ...
Armknecht, Frederik   +5 more
openaire   +3 more sources

Algebraic Attacks Galore! [PDF]

open access: yesGroups – Complexity – Cryptology, 2009
Summary: This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based
openaire   +1 more source

An efficient deep learning model for brain tumour detection with privacy preservation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific capabilities are capable of detecting, transmitting, learning and reasoning.
Mujeeb Ur Rehman   +8 more
wiley   +1 more source

Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if the attacker has full access to the execution environment. To obfuscate the round functions, Chow et al.
Yufeng Tang   +3 more
doaj   +1 more source

The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks

open access: yesEntropy, 2015
Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing.
Jun Choi   +3 more
doaj   +1 more source

Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks

open access: yesIEEE Access, 2022
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) for $\sigma $ -LFSRs. $\sigma $ -LFSRs with such configurations can be applied to any stream cipher that uses a word-based LFSR.
Subrata Nandi   +3 more
doaj   +1 more source

Algebraic Side-Channel Attacks [PDF]

open access: yes, 2010
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in general and ...
Mathieu Renauld   +1 more
openaire   +1 more source

Algebraic Attacks on Combiners with Memory [PDF]

open access: yes, 2003
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k,l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory ...
Armknecht, Frederik, Krause, Matthias
openaire   +1 more source

A Method of Ultra-Large-Scale Matrix Inversion Using Block Recursion

open access: yesInformation, 2020
Ultra-large-scale matrix inversion has been applied as the fundamental operation of numerous domains, owing to the growth of big data and matrix applications.
HouZhen Wang, Yan Guo, HuanGuo Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy