Results 41 to 50 of about 1,611 (184)
Novel extended multivariate public key cryptosystem
To resist linearization attack and differential attack effectively, a nonlinear invertible transformation based on“tame transformation” was constructed.
Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN
doaj +2 more sources
On the quantum security of high-dimensional RSA protocol
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine +3 more
doaj +1 more source
Algebraic attack on NTRU using Witt vectors and Gröbner bases
We present an algebraic attack on NTRU (restricted to the case where the parameter q is a power of two) using the method of the Witt vectors proposed by Silverman, Smart and Vercauteren [Springer: 278–298, 2005]; the latter considered only the first two ...
Bourgeois Gérald, Faugère Jean-Charles
doaj +1 more source
Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition
Algebraic persistent fault analysis (APFA), which combines algebraic analysis with persistent fault attacks, brings new challenges to the security of lightweight block ciphers and has received widespread attention since its introduction.
Xing Fang +5 more
doaj +1 more source
ABSTRACT Building on a quartz crystal microbalance with dissipation monitoring (QCM‐D), fouling in emulsion polymerization was compared between acrylate dispersions stabilized with a mobile, anionic surfactant and dispersions of poly(vinyl acetate‐co‐vinyl neodecanoate), PVAc, stabilized with polyvinyl alcohol, PVOH.
K. M. Hoffmann +5 more
wiley +1 more source
Algebraic Side Channel Attack on Trivium and Grain Ciphers
Solving a system of multivariate quadratic equations obtained through algebraic cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of stream ciphers based on nonlinear update, the success of algebraic attacks has ...
Asif Raza Kazmi +4 more
doaj +1 more source
Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj +1 more source
Algebraic Attacks on Summation Generators [PDF]
We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses n LFSRs, an algebraic equation relating the key stream bits and LFSR output bits can be made to be of degree less than or equal to \(^{\lceil\log_2 n \rceil}\) using ⌈log2 n ⌉ + 1 consecutive key stream bits. This is much lower
Dong Hoon Lee +4 more
openaire +1 more source
Universal Entanglement and an Information‐Complete Quantum Theory
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley +1 more source
Protecting Obfuscation against Algebraic Attacks [PDF]
Recently, Garg, Gentry, Halevi, Raykova, Sahai, and Waters (FOCS 2013) constructed a general-purpose obfuscating compiler for NC1 circuits. We describe a simplified variant of this compiler, and prove that it is a virtual black box obfuscator in a generic multilinear map model.
Boaz Barak +4 more
openaire +1 more source

