Results 201 to 210 of about 6,764 (215)
Some of the next articles are maybe not open access.

Algebraic Cryptanalysis of Variants of Frit

2020
Frit is a cryptographic 384-bit permutation recently proposed by Simon et al. and follows a novel design approach for built-in countermeasures against fault attacks. We analyze the cryptanalytic security of Frit in different use cases and propose attacks on the full-round primitive.
Christoph Dobraunig   +3 more
openaire   +1 more source

Impossible Differential-Algebraic Cryptanalysis of Serpent

2009 International Conference on Multimedia Information Networking and Security, 2009
Serpent is an SP Network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of Serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher.
Zhihua Hu, Zhongping Qin, Haiqing Han
openaire   +1 more source

Algebraic Cryptanalysis of CTRU Cryptosystem

2008
CTRU, a public key cryptosystem was proposed by Gaborit, Ohler and Sole. It is analogue of NTRU, the ring of integers replaced by the ring of polynomials $\mathbb{F}_2[T]$. It attracted attention as the attacks based on either LLL algorithm or the Chinese Remainder Theorem are avoided on it, which is most common on NTRU.
openaire   +1 more source

Review ofAlgebraic Cryptanalysis

Cryptologia, 2010
Bard, Gregory V., Algebraic Cryptanalysis, 2009, Springer-Verlag, New York, 356 pages, $129.00, hardcover. In his 1941 address to the American Mathematical Society, A. A. Albert [2, p.
openaire   +1 more source

Differential-Linear Cryptanalysis from an Algebraic Perspective

2021
The differential-linear cryptanalysis is an important cryptanalytic tool in cryptography, and has been extensively researched since its discovery by Langford and Hellman in 1994. There are nevertheless very few methods to study the middle part where the differential and linear trail connect.
Meicheng Liu, Xiaojuan Lu, Dongdai Lin
openaire   +1 more source

Algebraic Cryptanalysis of A NLFSR Based Stream Cipher

2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Among recent developments on stream ciphers, the algebraic attack has gained much attention. In this paper we concentrate on algebraic cryptanalysis of Grain, a non-linear feedback shift register (NLFSR) based stream cipher. The target here is to analyze generic key generating structure of Grain, that is why, we aim to recover the internal states of ...
Mehreen Afzal, Ashraf Masood
openaire   +1 more source

Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases

2009
Block ciphers are one of the most important classes of cryptographic algorithms in current use. Commonly used to provide confidentiality for transmission and storage of information, they encrypt and decrypt blocks of data according to a secret key.
Carlos Cid, Ralf-Philipp Weinmann
openaire   +1 more source

Algebraic-Differential Cryptanalysis of DES

2009
Algebraic cryptanalysis is as a general framework that permits to assess the security of a wide range of cryptographic schemes. However, the feasibility of algebraic cryptanalysis against block ciphers remains the source of speculation and especially in targeting modern block ciphers.
Faugère, Jean-Charles   +2 more
openaire   +1 more source

Algebraic Cryptanalysis of the Data Encryption Standard

2007
In spite of growing importance of the Advanced Encryption Standard (AES), the Data Encryption Standard (DES) is by no means obsolete. DES has never been broken from the practical point of view. The variant "triple DES" is believed very secure, is widely used, especially in the financial sector, and should remain so for many many years to come.
Nicolas T. Courtois, Gregory V. Bard
openaire   +1 more source

Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems

2010
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were proposed as efficient and secure schemes. In particular, the inventors of the two schemes claim that Little Dragon Two and Poly-Dragon resist algebraic cryptanalysis. In this paper, we show that MXL2, an algebraic attack method based on the XL algorithm and
Johannes Buchmann   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy