Results 41 to 50 of about 6,764 (215)

New cryptanalysis of LowMC with algebraic techniques

open access: yesDesigns, Codes and Cryptography, 2023
AbstractLowMC is a family of block ciphers proposed by Albrecht et al. at EUROCRYPT 2015, which is tailored specifically for FHE and MPC applications. At ToSC 2018, a difference enumeration attack was given for the cryptanalysis of low-data instances of full LowMCv2 with few applied S-boxes per round.
Wenxiao Qiao   +4 more
openaire   +1 more source

Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015

open access: yesComputation, 2020
In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik.
Evgenia Ishchukova   +2 more
doaj   +1 more source

Design of substitution nodes (S-Boxes) of a block cipher intended for preliminary encryption of confidential information

open access: yesCogent Engineering, 2022
This paper considers a new method for obtaining an S-box, which is one of the nonlinear transformations used in modern block-symmetric cipher systems.
Ardabek Khompysh   +4 more
doaj   +1 more source

Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis

open access: yesJournal of Electrical and Computer Engineering, 2017
The zero-dimensional Gröbner basis construction is a crucial step in Gröbner basis cryptanalysis on AES-256. In this paper, after performing an in-depth study on the linear transformation and the system of multivariate polynomial equations of AES-256 ...
Kaixin Zhao, Jie Cui, Zhiqiang Xie
doaj   +1 more source

Transformation Method for Solving System of Boolean Algebraic Equations

open access: yesMathematics, 2021
In recent years, various methods and directions for solving a system of Boolean algebraic equations have been invented, and now they are being very actively investigated. One of these directions is the method of transforming a system of Boolean algebraic
Dostonjon Barotov   +6 more
doaj   +1 more source

Algebraic fault attack on PRESENT

open access: yesTongxin xuebao, 2012
A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis ...
Ke-hui WU   +4 more
doaj   +2 more sources

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Improved Integral Attack on Reduced-Round Simeck

open access: yesIEEE Access, 2019
Simeck, a family of lightweight block ciphers utilizing Simon-like structure, is widely used under resource constrained environment. So far, many cryptanalysis methods have been used to attack Simeck.
Hang Li, Jiongjiong Ren, Shaozhen Chen
doaj   +1 more source

Home - About - Disclaimer - Privacy