Results 161 to 170 of about 1,200 (188)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Probabilistic Algebraic Attacks
2005This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the distance between a Boolean function and a function with annihilator of a certain degree.
Braeken, An, Preneel, Bart
openaire +2 more sources
A new algebraic attack on DASTA
Journal of High Speed Networks, 2023As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number of ANDs per encrypted bit are quite small.
Zhao, Haixia, Li, Keque, Wei, Yongzhuang
openaire +1 more source
SMS4 Algorithm Algebra Fault Attack
2010 Third International Symposium on Electronic Commerce and Security, 2010SMS4 algorithm packet length and key length is 128bit. This article presents a SMS4 algorithm of byte-oriented theory, algebraic fault attack only need 1 error redaction that we can recover SMS4 of 128bit key.
Hu Zhihua, Liao Xiaoyong
openaire +1 more source
Algebraic attacks on cipher systems
2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005Recently, algebraic attacks have emerged as a new type of cryptographic attack on block ciphers. These attacks involve the formulation of a system of nonlinear equations that describe the secret keybits in terms of the input and output bits of the block cipher, which is then solved.
openaire +1 more source
Hardware attacks: an algebraic approach
Journal of Cryptographic Engineering, 2016Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the hardware to imitate or understand the system design, to gain access to the system or to obtain encryption keys. They may also try to initiate attacks such as denial of service to disable the services supported by a chip, or reduce
Samer Moein +2 more
openaire +1 more source
Algebraic Attack on HFE Revisited
2008In this paper, we study how the algebraic attack on the HFE multivariate public key cryptosystem works if we build an HFE cryptosystem on a finite field whose characteristic is not two. Using some very basic algebraic geometry we argue that when the characteristic is not two the algebraic attack should not be polynomial in the range of the parameters ...
Jintai Ding +2 more
openaire +1 more source
Algebraic Attacks on Round-Reduced Keccak
2021Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in analyzing the collision resistance and preimage resistance of round-reduced Keccak.
Fukang Liu +3 more
openaire +1 more source
Simplifying algebraic attacks with univariate analysis
2011 Information Theory and Applications Workshop, 2011The purpose of this paper is to present a more fine-grained view on cryptanalysis of stream ciphers based on LFSRs in terms of the univariate representation and to provide some connections to cyclic codes. A usual way of presenting such ciphers is in terms of multivariate equations over GF(2).
Tor Helleseth, Sondre Ronjom
openaire +1 more source
Meeting the Attacks on Algebra
The Mathematics Teacher, 1926No subject in the high school curriculum, according to some educators, has yielded such unsatisfactory results as Algebra. It has been the subject of most severe criticisms on all sides, and has been held responsible for a great deal of freshman mortality. A leading educator of Massachusetts, in one of his public speeches, has expressed the desire that
openaire +1 more source

