Results 141 to 150 of about 284 (159)
Some of the next articles are maybe not open access.
Algebraic Cryptanalysis and RFID Authentication
2015The standardization group ISO/IEC SC31/WG7 is working on a set of cryptographic suites to provide security to wireless devices including UHF RFID tags. These cryptographic suites are presented as independent parts to a single standard ISO/IEC 29167. Within this multi-part standard 29167-15 is based around very simple operations and intended to provide ...
Carlos Cid +3 more
openaire +1 more source
Algebraic Cryptanalysis of Variants of Frit
2020Frit is a cryptographic 384-bit permutation recently proposed by Simon et al. and follows a novel design approach for built-in countermeasures against fault attacks. We analyze the cryptanalytic security of Frit in different use cases and propose attacks on the full-round primitive.
Christoph Dobraunig +3 more
openaire +1 more source
Impossible Differential-Algebraic Cryptanalysis of Serpent
2009 International Conference on Multimedia Information Networking and Security, 2009Serpent is an SP Network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of Serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher.
Zhihua Hu, Zhongping Qin, Haiqing Han
openaire +1 more source
Methods to solve algebraic equations in cryptanalysis
Tatra Mountains Mathematical Publications, 2010ABSTRACT The goal of the present paper is a survey of methods to solve equation systems common in cryptanalysis. The methods depend on the equation representation and fall into three categories: Gröbner basis algorithms, SAT-solving methods and Agreeing-Gluing algorithms.
Igor Semaev, Michal Mikuš
openaire +1 more source
Algebraic Cryptanalysis of CTRU Cryptosystem
2008CTRU, a public key cryptosystem was proposed by Gaborit, Ohler and Sole. It is analogue of NTRU, the ring of integers replaced by the ring of polynomials $\mathbb{F}_2[T]$. It attracted attention as the attacks based on either LLL algorithm or the Chinese Remainder Theorem are avoided on it, which is most common on NTRU.
openaire +1 more source
Review ofAlgebraic Cryptanalysis
Cryptologia, 2010Bard, Gregory V., Algebraic Cryptanalysis, 2009, Springer-Verlag, New York, 356 pages, $129.00, hardcover. In his 1941 address to the American Mathematical Society, A. A. Albert [2, p.
openaire +1 more source
Differential-Linear Cryptanalysis from an Algebraic Perspective
2021The differential-linear cryptanalysis is an important cryptanalytic tool in cryptography, and has been extensively researched since its discovery by Langford and Hellman in 1994. There are nevertheless very few methods to study the middle part where the differential and linear trail connect.
Meicheng Liu, Xiaojuan Lu, Dongdai Lin
openaire +1 more source
Algebraic Cryptanalysis of A NLFSR Based Stream Cipher
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008Among recent developments on stream ciphers, the algebraic attack has gained much attention. In this paper we concentrate on algebraic cryptanalysis of Grain, a non-linear feedback shift register (NLFSR) based stream cipher. The target here is to analyze generic key generating structure of Grain, that is why, we aim to recover the internal states of ...
Mehreen Afzal, Ashraf Masood
openaire +1 more source
Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases
2009Block ciphers are one of the most important classes of cryptographic algorithms in current use. Commonly used to provide confidentiality for transmission and storage of information, they encrypt and decrypt blocks of data according to a secret key.
Carlos Cid, Ralf-Philipp Weinmann
openaire +1 more source
Algebraic-Differential Cryptanalysis of DES
2009Algebraic cryptanalysis is as a general framework that permits to assess the security of a wide range of cryptographic schemes. However, the feasibility of algebraic cryptanalysis against block ciphers remains the source of speculation and especially in targeting modern block ciphers.
Faugère, Jean-Charles +2 more
openaire +1 more source

