Results 81 to 90 of about 458 (184)
Minimal basis of the syzygies module of leading terms
Systems of polynomial equations are one of the most universal mathematical objects. Almost all the problems of cryptographic analysis can be reduced to finding solutions to systems of polynomial equations.
A. V. Sokurov
doaj +1 more source
Random subgroups and analysis of the length-based and quotient attacks
In this paper we discuss generic properties of “random subgroups” of a given group G. It turns out that in many groups G (even in most exotic of them) the random subgroups have a simple algebraic structure and they “sit” inside G in a very particular way.
Myasnikov Alexei G., Ushakov Alexander
doaj +1 more source
New cryptanalysis of LowMC with algebraic techniques [PDF]
Wenxiao Qiao +4 more
openalex +1 more source
Solving the problem of boolean satisfiability for estimating the security of block ciphers magma and present to algebraic cryptanalysis [PDF]
Liudmila Babenko, Ekaterina Maro
openalex +1 more source
Algebraic cryptanalysis of HFE and Filter Generators.
HFE (Hidden Fields Equations) is a public key cryptosystem using polynomial operations over finite fields. It has been proposed by Jacques Patarin at Eurocrypt 96 following the ideas of Matsumoto and Imai. It has long been regarded as a very promising cryptosystem because it can be used to produce signatures as short as 128, 100 and even 80 bits.
openaire +2 more sources
A study of text-theoretical approach to S-box construction with image encryption applications. [PDF]
Mahboob A, Nadeem M, Rasheed MW.
europepmc +1 more source
Fully Dynamic Advanced Encryption Standard
As the reliance on using electronic services increases, the use of a strong encryption algorithm becomes paramount. The AES is the most widely used cipher. However, AES uses static transformations that attackers might exploit to cryptanalyze AES. In this
Shiraz Naserelden +3 more
doaj +1 more source
Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations. [PDF]
Razaq A +4 more
europepmc +1 more source
A message recovery attack on multivariate polynomial trapdoor function. [PDF]
Ali R +4 more
europepmc +1 more source

