Results 21 to 30 of about 1,782,571 (254)

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks [PDF]

open access: yes, 2006
In this paper we propose several efficient algorithms for assessing the resistance of Boolean functions against algebraic and fast algebraic attacks when implemented in LFSR-based stream ciphers. An algorithm is described which permits to compute the algebraic immunity d of a Boolean function with n variables in $\mathcal{O}(D^2)$ operations, for $D ...
Armknecht, Frederik   +5 more
openaire   +3 more sources

Algebraic Attacks Galore! [PDF]

open access: yesGroups – Complexity – Cryptology, 2009
Summary: This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based
openaire   +1 more source

A new approach based on quadratic forms to attack the McEliece cryptosystem [PDF]

open access: yesIACR Cryptology ePrint Archive, 2023
We bring in here a novel algebraic approach for attacking the McEliece cryptosystem. It consists in introducing a subspace of matrices representing quadratic forms.
Alain Couvreur, Rocco Mora, J. Tillich
semanticscholar   +1 more source

Polynomial Time Key-Recovery Attack on High Rate Random Alternant Codes [PDF]

open access: yesIEEE Transactions on Information Theory, 2023
A long standing open question is whether the distinguisher of high rate alternant codes or Goppa codes from Faugère, Gauthier-Uma na, Otmani, Perret, and Tillich in 2011 can be turned into an algorithm recovering the algebraic structure of such codes ...
M. Bardet, Rocco Mora, J. Tillich
semanticscholar   +1 more source

Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
White-box implementations aim to prevent the key extraction of the cryptographic algorithm even if the attacker has full access to the execution environment. To obfuscate the round functions, Chow et al.
Yufeng Tang   +3 more
doaj   +1 more source

The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks

open access: yesEntropy, 2015
Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing.
Jun Choi   +3 more
doaj   +1 more source

Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks

open access: yesIEEE Access, 2022
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) for $\sigma $ -LFSRs. $\sigma $ -LFSRs with such configurations can be applied to any stream cipher that uses a word-based LFSR.
Subrata Nandi   +3 more
doaj   +1 more source

Algebraic Side-Channel Attacks [PDF]

open access: yes, 2010
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in general and ...
Mathieu Renauld   +1 more
openaire   +1 more source

An efficient deep learning model for brain tumour detection with privacy preservation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific capabilities are capable of detecting, transmitting, learning and reasoning.
Mujeeb Ur Rehman   +8 more
wiley   +1 more source

Algebraic Attacks on Combiners with Memory [PDF]

open access: yes, 2003
Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k,l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory ...
Armknecht, Frederik, Krause, Matthias
openaire   +1 more source

Home - About - Disclaimer - Privacy