Results 191 to 200 of about 1,782,571 (254)
Some of the next articles are maybe not open access.
Algebraic Attack on HFE Revisited
Information Security Conference, 2008In this paper, we study how the algebraic attack on the HFE multivariate public key cryptosystem works if we build an HFE cryptosystem on a finite field whose characteristic is not two. Using some very basic algebraic geometry we argue that when the characteristic is not two the algebraic attack should not be polynomial in the range of the parameters ...
Jintai Ding +2 more
openaire +2 more sources
Chosen IV algebraic attack on One.Fivium
2008 3rd International Conference on Intelligent System and Knowledge Engineering, 2008One of the key questions in algebraic attacks is how to effectively reduce the degree of the function. Based on the algebraic attack, this paper presents a new algorithm of attack - chosen IV algebraic attack, which can reduce the function?s degree by choosing appropriate IV.
Zhe Sun, Shi-Wu Zhang, Lei Wang
openaire +2 more sources
An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH codes
Information Theory Workshop, 2023We present an algebraic attack on a McEliece-like scheme based on BCH codes (BCH-McEliece), where the Goppa code is replaced by a suitably permuted BCH code.
Freja Elbro, Christian Majenz
semanticscholar +1 more source
An algebraic attack on the improved summation generator with 2-bit memory
Information Processing Letters, 2005Daewan Han, Moon-Shik Lee
semanticscholar +3 more sources
S-boxes representation and efficiency of algebraic attack
IET Information Security, 2019Algebraic analysis of block ciphers aims at finding the secret key by solving a collection of polynomial equations that describe the internal structure of a cipher for chosen observations of plaintext/ciphertext pairs.
Hossein Arabnezhad-Khanoki +2 more
semanticscholar +1 more source
Hardware-Oriented Algebraic Fault Attack Framework with Multiple Fault Injection Support
Workshop on Fault Diagnosis and Tolerance in Cryptography, 2019The evaluation of fault attacks on security-critical hardware implementations of cryptographic primitives is an important concern. In such regards, we have created a framework for automated construction of fault attacks on hardware realization of ciphers.
Mael Gay +4 more
semanticscholar +1 more source
Probabilistic Algebraic Attacks
2005This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the distance between a Boolean function and a function with annihilator of a certain degree.
Braeken, An, Preneel, Bart
openaire +2 more sources
A new algebraic attack on DASTA
Journal of High Speed Networks, 2023As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number of ANDs per encrypted bit are quite small.
Zhao, Haixia, Li, Keque, Wei, Yongzhuang
openaire +1 more source
SMS4 Algorithm Algebra Fault Attack
2010 Third International Symposium on Electronic Commerce and Security, 2010SMS4 algorithm packet length and key length is 128bit. This article presents a SMS4 algorithm of byte-oriented theory, algebraic fault attack only need 1 error redaction that we can recover SMS4 of 128bit key.
Hu Zhihua, Liao Xiaoyong
openaire +1 more source
Algebraic attacks on cipher systems
2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005Recently, algebraic attacks have emerged as a new type of cryptographic attack on block ciphers. These attacks involve the formulation of a system of nonlinear equations that describe the secret keybits in terms of the input and output bits of the block cipher, which is then solved.
openaire +1 more source

