Results 11 to 20 of about 1,782,571 (254)
Algebraic attack on NTRU using Witt vectors and Gröbner bases
We present an algebraic attack on NTRU (restricted to the case where the parameter q is a power of two) using the method of the Witt vectors proposed by Silverman, Smart and Vercauteren [Springer: 278–298, 2005]; the latter considered only the first two ...
Bourgeois Gérald, Faugère Jean-Charles
doaj +4 more sources
Practical Algebraic Attack on DAGS [PDF]
16 pages, accepted for publication in the 7th Code-Based Cryptography Workshop ...
Bardet, Magali +3 more
openaire +5 more sources
Advanced Algebraic Attack on Trivium [PDF]
This paper presents an algebraic attack against Trivium that breaks 625 rounds using only 4096 bits of output in an overall time complexity of $$2^{42.2}$$ Trivium computations. While other attacks can do better in terms of rounds 799, this is a practical attack with a very low data usage down from $$2^{40}$$ output bits and low computation time down ...
Frank-M. Quedenfeld, Christopher Wolf
openaire +2 more sources
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Fully homomorphic encryption (FHE) is an advanced cryptography technique to allow computations (i.e., addition and multiplication) over encrypted data.
Fukang Liu +3 more
doaj +2 more sources
Algebraic Attack on the Alternating Step(r,s)Generator [PDF]
The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others.
Hassanzadeh, Mehdi M., Helleseth, Tor
core +3 more sources
Algebraic Side Channel Attack on Trivium and Grain Ciphers
Solving a system of multivariate quadratic equations obtained through algebraic cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of stream ciphers based on nonlinear update, the success of algebraic attacks has ...
Asif Raza Kazmi +4 more
doaj +2 more sources
An algebraic attack to the Bluetooth stream cipher E0 [PDF]
In this paper we study the security of the Bluetooth stream cipher E0 from the viewpoint it is a"difference stream cipher", that is, it is defined by a system of explicit difference equations over the finite field GF(2).
R. L. Scala +3 more
semanticscholar +1 more source
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG [PDF]
In this paper, we propose a new algebraic attack on stream ciphers. Starting from the well-known attack due to Courtois and Meier, we design an attack especially effective against nonlinear filter generators.
Carla Mascia, Enrico Piccione, M. Sala
semanticscholar +1 more source
An Algebraic Attack on Rank Metric Code-Based Cryptosystems [PDF]
The Rank metric decoding problem is the main problem considered in cryptography based on codes in the rank metric. Very efficient schemes based on this problem or quasi-cyclic versions of it have been proposed recently, such as those in the submissions ...
M. Bardet +6 more
semanticscholar +1 more source
Practical Cube Attack against Nonce-Misused Ascon
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin +2 more
doaj +1 more source

