Results 51 to 60 of about 6,665 (199)
Improved Integral Attack on Reduced-Round Simeck
Simeck, a family of lightweight block ciphers utilizing Simon-like structure, is widely used under resource constrained environment. So far, many cryptanalysis methods have been used to attack Simeck.
Hang Li, Jiongjiong Ren, Shaozhen Chen
doaj +1 more source
Cryptanalysis of ARX-based White-box Implementations
At CRYPTO’22, Ranea, Vandersmissen, and Preneel proposed a new way to design white-box implementations of ARX-based ciphers using so-called implicit functions and quadratic-affine encodings. They suggest the Speck block-cipher as an example target.
Alex Biryukov +2 more
doaj +1 more source
(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley +1 more source
Squares of matrix-product codes [PDF]
The component-wise or Schur product $C*C'$ of two linear error-correcting codes $C$ and $C'$ over certain finite field is the linear code spanned by all component-wise products of a codeword in $C$ with a codeword in $C'$.
Cascudo, Ignacio +2 more
core +3 more sources
Algebraic cryptanalysis and new security enhancements
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano +5 more
wiley +1 more source
Algebraic Techniques in Differential Cryptanalysis Revisited [PDF]
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differential cryptanalysis. They introduced three new attacks, namely Attack A, Attack B and Attack C. For Attack A, they explain that the time complexity is difficult to determine.
Wang, Meiqin +3 more
openaire +2 more sources
A Generalization of Gaussian Balancing and Gaussian Balancing‐Lucas Numbers With Applications
In this paper, we study a generalization of Gaussian balancing and Gaussian Lucas‐balancing numbers, we find their generating functions, Binet formulas, related matrix representation, and many other properties. Also, we provide some applications in cryptography.
T. Al-Asoully +2 more
wiley +1 more source
Algebraic Attacks against Some Arithmetization-Oriented Primitives
Recent advanced Zero-Knowledge protocols, along with other high-level constructions such as Multi-Party Computations (MPC), have highlighted the need for a new type of symmetric primitives that are not optimized for speed on the usual platforms (desktop
Augustin Bariant +3 more
doaj +1 more source
Further Results of the Cryptographic Properties on the Butterfly Structures
Recently, a new structure called butterfly introduced by Perrin et at. is attractive for that it has very good cryptographic properties: the differential uniformity is at most equal to 4 and algebraic degree is also very high when exponent $e=3$.
Feng, Xiutao, Fu, Shihui
core +1 more source

