Results 191 to 200 of about 1,782,571 (254)
Some of the next articles are maybe not open access.

Algebraic Attack on HFE Revisited

Information Security Conference, 2008
In this paper, we study how the algebraic attack on the HFE multivariate public key cryptosystem works if we build an HFE cryptosystem on a finite field whose characteristic is not two. Using some very basic algebraic geometry we argue that when the characteristic is not two the algebraic attack should not be polynomial in the range of the parameters ...
Jintai Ding   +2 more
openaire   +2 more sources

Chosen IV algebraic attack on One.Fivium

2008 3rd International Conference on Intelligent System and Knowledge Engineering, 2008
One of the key questions in algebraic attacks is how to effectively reduce the degree of the function. Based on the algebraic attack, this paper presents a new algorithm of attack - chosen IV algebraic attack, which can reduce the function?s degree by choosing appropriate IV.
Zhe Sun, Shi-Wu Zhang, Lei Wang
openaire   +2 more sources

An Algebraic Attack Against McEliece-like Cryptosystems Based on BCH codes

Information Theory Workshop, 2023
We present an algebraic attack on a McEliece-like scheme based on BCH codes (BCH-McEliece), where the Goppa code is replaced by a suitably permuted BCH code.
Freja Elbro, Christian Majenz
semanticscholar   +1 more source

S-boxes representation and efficiency of algebraic attack

IET Information Security, 2019
Algebraic analysis of block ciphers aims at finding the secret key by solving a collection of polynomial equations that describe the internal structure of a cipher for chosen observations of plaintext/ciphertext pairs.
Hossein Arabnezhad-Khanoki   +2 more
semanticscholar   +1 more source

Hardware-Oriented Algebraic Fault Attack Framework with Multiple Fault Injection Support

Workshop on Fault Diagnosis and Tolerance in Cryptography, 2019
The evaluation of fault attacks on security-critical hardware implementations of cryptographic primitives is an important concern. In such regards, we have created a framework for automated construction of fault attacks on hardware realization of ciphers.
Mael Gay   +4 more
semanticscholar   +1 more source

Probabilistic Algebraic Attacks

2005
This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the distance between a Boolean function and a function with annihilator of a certain degree.
Braeken, An, Preneel, Bart
openaire   +2 more sources

A new algebraic attack on DASTA

Journal of High Speed Networks, 2023
As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number of ANDs per encrypted bit are quite small.
Zhao, Haixia, Li, Keque, Wei, Yongzhuang
openaire   +1 more source

SMS4 Algorithm Algebra Fault Attack

2010 Third International Symposium on Electronic Commerce and Security, 2010
SMS4 algorithm packet length and key length is 128bit. This article presents a SMS4 algorithm of byte-oriented theory, algebraic fault attack only need 1 error redaction that we can recover SMS4 of 128bit key.
Hu Zhihua, Liao Xiaoyong
openaire   +1 more source

Algebraic attacks on cipher systems

2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005
Recently, algebraic attacks have emerged as a new type of cryptographic attack on block ciphers. These attacks involve the formulation of a system of nonlinear equations that describe the secret keybits in terms of the input and output bits of the block cipher, which is then solved.
openaire   +1 more source

Home - About - Disclaimer - Privacy