Results 51 to 60 of about 6,764 (215)

Cryptanalysis of ARX-based White-box Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
At CRYPTO’22, Ranea, Vandersmissen, and Preneel proposed a new way to design white-box implementations of ARX-based ciphers using so-called implicit functions and quadratic-affine encodings. They suggest the Speck block-cipher as an example target.
Alex Biryukov   +2 more
doaj   +1 more source

Імовірнісний алгебраїчний криптоаналіз шифратора «SFINKS» з певним класом фільтруючих функцій [PDF]

open access: yes, 2008
Експериментально знайдено ключ потокового шифратора «SFINKS» з послабленою фільтруючою функцією за допомогою імовірнісної алгебраїчної атаки. Клас таких вразливих функцій досить широкий і містить багато функцій, стійких проти відомих неалгебраїчних ...
Пометун, Сергій
core  

Algebraic Cryptanalysis of Simplified AES∗

open access: yesCryptologia, 2009
Abstract Simplified AES was developed in 2003, as a teaching tool to help students understand AES. It was designed so that the two primary attacks on symmetric-key block ciphers of that time, differential cryptanalysis and linear cryptanalysis, are not trivial on simplified AES.
openaire   +1 more source

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Algebraic cryptanalysis and new security enhancements

open access: yesMoscow Journal of Combinatorics and Number Theory, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

A New Method for Constructing Integral‐Resistance Matrix for 5‐Round AES

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
A powerful theory for evaluating block ciphers against integral distinguishers was introduced by Hebborn et al. at ASIACRYPT 2021. To show the integral‐resistance property for a block cipher, their core idea is to construct a full‐rank integral‐resistance matrix. However, their method does not work practically for 5‐round AES due to the large S‐box and
Fanyang Zeng, Tian Tian, Qichun Wang
wiley   +1 more source

Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard [PDF]

open access: yes, 2011
As we know Cryptology is divided into two parts: “Cryptography” and “Cryptanalysis”. Since block ciphers can be deployed in many different applications, so we focus on Advanced Encryption Standard (AES) which is the successor of Data Encryption Standard
Rezaeipour, Davood
core  

Cryptanalysis of three matrix-based key establishment protocols [PDF]

open access: yes, 2011
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to ...
Blackburn, Simon R.   +2 more
core   +4 more sources

Algebraic Cryptanalysis of GOST Encryption Algorithm

open access: yesJournal of Computer and Communications, 2014
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define ...
Ludmila Babenko, Ekaterina Maro
openaire   +2 more sources

Home - About - Disclaimer - Privacy