Results 21 to 30 of about 687 (113)

Solving weakened cryptanalysis problems for the Bivium cipher in the volunteer computing project SAT@home

open access: yesInternational Journal of Open Information Technologies, 2015
In this paper, a SAT-based cryptanalysis of the Bivium stream cipher is considered. For encoding the initial cryptanalysis problem into SAT a special program Transalg was used. For an obtained SAT instance we use Monte Carlo method to search for a partitioning with good time estimation.
Oleg Zaikin   +2 more
openaire   +2 more sources

Accelerating First-Order Secure ML-KEM With Masked SHA-3: Cost, Randomness, and Security Evaluation

open access: yesIEEE Access
Hash functions are fundamental for ensuring authenticity and integrity in digital communications. Their importance has grown with the advent of Post-Quantum Cryptography (PQC), as many newly standardized PQC algorithms, such as ML-KEM, heavily rely on ...
Stefano Di Matteo   +5 more
doaj   +1 more source

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]

open access: yes, 2009
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov   +16 more
core   +2 more sources

Model design for a reduced variant of a Trivium Type Stream Cipher

open access: yesJournal of Computer Science and Technology, 2014
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorithm and its variants. In particular, we study the NLFSRs used in these generators, their feedback functions and their combination.
Antonio Castro Lechtaler   +5 more
doaj  

La ética y estética del "Advertimiento" en la obra de Quevedo [PDF]

open access: yes, 2012
Quevedo's literary works display a set of variations on the anthropological and ethical dichotomy between existential awareness (“el vivir advertido”) and existential unawareness and aloofness (“la vida divertida”). As the author of hundreds of satirical
Sánchez Martínez de Pinillos, Hernán
core   +2 more sources

Dos supervivientes visigóticos (Zamora, AHP, fragmentos 15 y 202) [PDF]

open access: yes, 2006
Els fragments 15 i 202 de l'Arxiu Històric Provincial de Zamora transmeten el nou ritu romà encara en un embolcall gràfic més aviat propi de la vella litúrgia hispànica.
Ana Suárez González
core   +3 more sources

L'epistola del Ventoso e le misure della rappresentazione petrarchesca della realtà [PDF]

open access: yes, 2006
Nell'epistola del Ventoso Petrarca esprime non solo la prospettiva «agostiniana» di una nuova concezione, antinaturalistica etica introspettiva, del sapere ma mette in scena il superamento della rappresentazione teologico-medievale del mondo (il ...
Botti, Francesco Paolo
core   +2 more sources

Curial e Güelfa, un nou món per a un nou cavaller: espais literaris en un entorn humanístic

open access: yesScripta: Revista Internacional de Literatura i Cultura Medieval i Moderna, 2018
Resum: El Curial e Güelfa és una novel·la que sorprèn per la seva modernitat. Tot i que conserva certes reminiscències medievals, com a resultat del gènere cavalleresc que la caracteritza, hem de situar-la dins de l’ambient humanista de la Itàlia del ...
Jeroni Miguel Briongos
semanticscholar   +1 more source

Higher order differentiation over finite fields with applications to generalising the cube attack [PDF]

open access: yes, 2016
Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack of Dinur and Shamir and the AIDA attack of Vielhaber.
Ana Sălăgean   +3 more
core   +1 more source

On Cryptographic Attacks Using Backdoors for SAT

open access: yes, 2018
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of computationally hard problems, one of which is cryptanalysis.
Ignatiev, Alexey   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy