Results 21 to 30 of about 284 (159)

Algebraic Cryptanalysis of the PKC’2009 Algebraic Surface Cryptosystem [PDF]

open access: yes, 2010
In this paper, we fully break the Algebraic Surface Cryptosystem (ASC for short) proposed at PKC’2009 [3]. This system is based on an unusual problem in multivariate cryptography: the Section Finding Problem. Given an algebraic surface $X(x,y,t)\in\mathbb{F}_p[x,y,t]$ such that $\deg_{xy} X(x,y,t)= w$, the question is to find a pair of polynomials of ...
Jean-Charles Faugère   +1 more
openaire   +2 more sources

Cryptanalysis of an Algebraic Privacy Homomorphism [PDF]

open access: yes, 2003
We use linear algebra to show that an algebraic privacy homomorphism proposed by Domingo-Ferrer is insecure for some parameter settings.
openaire   +2 more sources

New cryptanalysis of LowMC with algebraic techniques

open access: yesDesigns, Codes and Cryptography, 2023
AbstractLowMC is a family of block ciphers proposed by Albrecht et al. at EUROCRYPT 2015, which is tailored specifically for FHE and MPC applications. At ToSC 2018, a difference enumeration attack was given for the cryptanalysis of low-data instances of full LowMCv2 with few applied S-boxes per round.
Wenxiao Qiao   +4 more
openaire   +1 more source

Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015

open access: yesComputation, 2020
In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik.
Evgenia Ishchukova   +2 more
doaj   +1 more source

Transformation Method for Solving System of Boolean Algebraic Equations

open access: yesMathematics, 2021
In recent years, various methods and directions for solving a system of Boolean algebraic equations have been invented, and now they are being very actively investigated. One of these directions is the method of transforming a system of Boolean algebraic
Dostonjon Barotov   +6 more
doaj   +1 more source

Design of substitution nodes (S-Boxes) of a block cipher intended for preliminary encryption of confidential information

open access: yesCogent Engineering, 2022
This paper considers a new method for obtaining an S-box, which is one of the nonlinear transformations used in modern block-symmetric cipher systems.
Ardabek Khompysh   +4 more
doaj   +1 more source

Algebraic fault attack on PRESENT

open access: yesTongxin xuebao, 2012
A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis ...
Ke-hui WU   +4 more
doaj   +2 more sources

Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis

open access: yesJournal of Electrical and Computer Engineering, 2017
The zero-dimensional Gröbner basis construction is a crucial step in Gröbner basis cryptanalysis on AES-256. In this paper, after performing an in-depth study on the linear transformation and the system of multivariate polynomial equations of AES-256 ...
Kaixin Zhao, Jie Cui, Zhiqiang Xie
doaj   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley   +1 more source

Home - About - Disclaimer - Privacy