Results 11 to 20 of about 1,782,571 (254)

Algebraic attack on NTRU using Witt vectors and Gröbner bases

open access: yesJournal of Mathematical Cryptology, 2009
We present an algebraic attack on NTRU (restricted to the case where the parameter q is a power of two) using the method of the Witt vectors proposed by Silverman, Smart and Vercauteren [Springer: 278–298, 2005]; the latter considered only the first two ...
Bourgeois Gérald, Faugère Jean-Charles
doaj   +4 more sources

Practical Algebraic Attack on DAGS [PDF]

open access: yesInternational Workshop on Code-Based Cryptography, 2019
16 pages, accepted for publication in the 7th Code-Based Cryptography Workshop ...
Bardet, Magali   +3 more
openaire   +5 more sources

Advanced Algebraic Attack on Trivium [PDF]

open access: yesInternational Conference on Mathematical Aspects of Computer and Information Sciences, 2016
This paper presents an algebraic attack against Trivium that breaks 625 rounds using only 4096 bits of output in an overall time complexity of $$2^{42.2}$$ Trivium computations. While other attacks can do better in terms of rounds 799, this is a practical attack with a very low data usage down from $$2^{40}$$ output bits and low computation time down ...
Frank-M. Quedenfeld, Christopher Wolf
openaire   +2 more sources

Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions

open access: yesIACR Transactions on Symmetric Cryptology
Fully homomorphic encryption (FHE) is an advanced cryptography technique to allow computations (i.e., addition and multiplication) over encrypted data.
Fukang Liu   +3 more
doaj   +2 more sources

Algebraic Attack on the Alternating Step(r,s)Generator [PDF]

open access: yes2010 IEEE International Symposium on Information Theory, 2010
The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others.
Hassanzadeh, Mehdi M., Helleseth, Tor
core   +3 more sources

Algebraic Side Channel Attack on Trivium and Grain Ciphers

open access: yesIEEE Access, 2017
Solving a system of multivariate quadratic equations obtained through algebraic cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of stream ciphers based on nonlinear update, the success of algebraic attacks has ...
Asif Raza Kazmi   +4 more
doaj   +2 more sources

An algebraic attack to the Bluetooth stream cipher E0 [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
In this paper we study the security of the Bluetooth stream cipher E0 from the viewpoint it is a"difference stream cipher", that is, it is defined by a system of explicit difference equations over the finite field GF(2).
R. L. Scala   +3 more
semanticscholar   +1 more source

An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG [PDF]

open access: yesInternational Journal of Applied Mathematics and Computer Sciences, 2021
In this paper, we propose a new algebraic attack on stream ciphers. Starting from the well-known attack due to Courtois and Meier, we design an attack especially effective against nonlinear filter generators.
Carla Mascia, Enrico Piccione, M. Sala
semanticscholar   +1 more source

An Algebraic Attack on Rank Metric Code-Based Cryptosystems [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2019
The Rank metric decoding problem is the main problem considered in cryptography based on codes in the rank metric. Very efficient schemes based on this problem or quasi-cyclic versions of it have been proposed recently, such as those in the submissions ...
M. Bardet   +6 more
semanticscholar   +1 more source

Practical Cube Attack against Nonce-Misused Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy