Results 1 to 10 of about 1,200 (188)

Algebraic Collision Attacks on Keccak

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier   +2 more
doaj   +4 more sources

Securing consensus in fractional-order multi-agent systems: Algebraic approaches against Byzantine attacks [PDF]

open access: yesHeliyon
This paper investigates the behavior of fractional-order nonlinear multi-agent systems subjected to Byzantine assaults, specifically focusing on the manipulations of both sensors and actuators.
Yubin Zhong   +6 more
doaj   +2 more sources

A White-Box Masking Scheme Resisting Computational and Algebraic Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
White-box cryptography attempts to protect cryptographic secrets in pure software implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by the industry even though the security of these constructions is not well defined ...
Okan Seker   +2 more
doaj   +1 more source

Algebraic Attacks against Some Arithmetization-Oriented Primitives

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Recent advanced Zero-Knowledge protocols, along with other high-level constructions such as Multi-Party Computations (MPC), have highlighted the need for a new type of symmetric primitives that are not optimized for speed on the usual platforms (desktop
Augustin Bariant   +3 more
doaj   +1 more source

Improved Attacks on LowMC with Algebraic Techniques

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj   +1 more source

Algebraic Decomposition Method for Zero Watermarking Technique in YCbCr Space [PDF]

open access: yesEngineering and Technology Journal, 2022
The close connection between mathematics, especially linear algebra, and computer science has greatly impacted the development of several fields, and the most important is image processing.
Nada Mohammed, Areej Abduldaim
doaj   +1 more source

High Order Side-Channel Security for Elliptic-Curve Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Elliptic-curve implementations protected with state-of-the-art countermeasures against side-channel attacks might still be vulnerable to advanced attacks that recover secret information from a single leakage trace.
Sonia Belaïd, Matthieu Rivain
doaj   +1 more source

Cryptanalysis of ARX-based White-box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
At CRYPTO’22, Ranea, Vandersmissen, and Preneel proposed a new way to design white-box implementations of ARX-based ciphers using so-called implicit functions and quadratic-affine encodings. They suggest the Speck block-cipher as an example target.
Alex Biryukov   +2 more
doaj   +1 more source

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks [PDF]

open access: yes, 2006
In this paper we propose several efficient algorithms for assessing the resistance of Boolean functions against algebraic and fast algebraic attacks when implemented in LFSR-based stream ciphers. An algorithm is described which permits to compute the algebraic immunity d of a Boolean function with n variables in $\mathcal{O}(D^2)$ operations, for $D ...
Armknecht, Frederik   +5 more
openaire   +3 more sources

Algebraic Attacks Galore! [PDF]

open access: yesGroups – Complexity – Cryptology, 2009
Summary: This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based
openaire   +1 more source

Home - About - Disclaimer - Privacy