Results 31 to 40 of about 284 (159)

Improved Integral Attack on Reduced-Round Simeck

open access: yesIEEE Access, 2019
Simeck, a family of lightweight block ciphers utilizing Simon-like structure, is widely used under resource constrained environment. So far, many cryptanalysis methods have been used to attack Simeck.
Hang Li, Jiongjiong Ren, Shaozhen Chen
doaj   +1 more source

Cryptanalysis of ARX-based White-box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
At CRYPTO’22, Ranea, Vandersmissen, and Preneel proposed a new way to design white-box implementations of ARX-based ciphers using so-called implicit functions and quadratic-affine encodings. They suggest the Speck block-cipher as an example target.
Alex Biryukov   +2 more
doaj   +1 more source

Algebraic Cryptanalysis of Simplified AES∗

open access: yesCryptologia, 2009
Abstract Simplified AES was developed in 2003, as a teaching tool to help students understand AES. It was designed so that the two primary attacks on symmetric-key block ciphers of that time, differential cryptanalysis and linear cryptanalysis, are not trivial on simplified AES.
openaire   +1 more source

Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field

open access: yesComputational and Mathematical Methods, Volume 2026, Issue 1, 2026.
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano   +5 more
wiley   +1 more source

Algebraic cryptanalysis and new security enhancements

open access: yesMoscow Journal of Combinatorics and Number Theory, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

Algebraic Cryptanalysis of GOST Encryption Algorithm

open access: yesJournal of Computer and Communications, 2014
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define ...
Ludmila Babenko, Ekaterina Maro
openaire   +2 more sources

Algebraic Techniques in Differential Cryptanalysis Revisited [PDF]

open access: yes, 2011
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differential cryptanalysis. They introduced three new attacks, namely Attack A, Attack B and Attack C. For Attack A, they explain that the time complexity is difficult to determine.
Wang, Meiqin   +3 more
openaire   +2 more sources

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Algebraic Attacks against Some Arithmetization-Oriented Primitives

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Recent advanced Zero-Knowledge protocols, along with other high-level constructions such as Multi-Party Computations (MPC), have highlighted the need for a new type of symmetric primitives that are not optimized for speed on the usual platforms (desktop
Augustin Bariant   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy