Results 201 to 210 of about 1,782,571 (254)
Some of the next articles are maybe not open access.
Hardware attacks: an algebraic approach
Journal of Cryptographic Engineering, 2016Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the hardware to imitate or understand the system design, to gain access to the system or to obtain encryption keys. They may also try to initiate attacks such as denial of service to disable the services supported by a chip, or reduce
Samer Moein +2 more
openaire +1 more source
Resistance to the Standard Algebraic Attack
Encyclopedia of Cryptography and Security, 2011openaire +2 more sources
Quantum Annealing and Algebraic Attack on Speck Cipher
International Conference on Conceptual Structures, 2022Elżbieta Burek, Michał Wroński
semanticscholar +1 more source
Algebraic Attacks on Round-Reduced Keccak
2021Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in analyzing the collision resistance and preimage resistance of round-reduced Keccak.
Fukang Liu +3 more
openaire +1 more source
Simplifying algebraic attacks with univariate analysis
2011 Information Theory and Applications Workshop, 2011The purpose of this paper is to present a more fine-grained view on cryptanalysis of stream ciphers based on LFSRs in terms of the univariate representation and to provide some connections to cyclic codes. A usual way of presenting such ciphers is in terms of multivariate equations over GF(2).
Tor Helleseth, Sondre Ronjom
openaire +1 more source
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
Journal of Systems Science and Complexity, 2021Yu-Ao Chen, Xiao-Shan Gao
semanticscholar +1 more source
Algebraic Meet-in-the-Middle Attack on LowMC
IACR Cryptology ePrint Archive, 2022Fukang Liu +4 more
semanticscholar +1 more source
Meeting the Attacks on Algebra
The Mathematics Teacher, 1926No subject in the high school curriculum, according to some educators, has yielded such unsatisfactory results as Algebra. It has been the subject of most severe criticisms on all sides, and has been held responsible for a great deal of freshman mortality. A leading educator of Massachusetts, in one of his public speeches, has expressed the desire that
openaire +1 more source
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks
2014Given a Boolean function with n variables, a revised algorithm for computing the algebraic immunity d against conventional algebraic attacks in O(D 2±e ) complexity is described for \(D=\sum _{i = 0}^d {n \choose i}\) and a small e, which corrects and clarifies the most efficient algorithm so far at Eurocrypt 2006.
Lin Jiao, Bin Zhang, Mingsheng Wang
openaire +1 more source
Algebraic attack on Mini-AES algorithm
AIP Conference Proceedings, 2016Algebraic attack is a potential powerful attack on symmetric key block cipher. It had been applied on two algorithm of AES simplification; there are Simplified AES and Baby Rijndael. In this research, the application of algebraic attack on Mini-AES algorithm was done to get a polynomial equations system of Mini-AES algorithm and its solutions using XL ...
Sundari Tianingrum, Santi Indarjani
openaire +1 more source

