Results 21 to 30 of about 687 (113)
In this paper, a SAT-based cryptanalysis of the Bivium stream cipher is considered. For encoding the initial cryptanalysis problem into SAT a special program Transalg was used. For an obtained SAT instance we use Monte Carlo method to search for a partitioning with good time estimation.
Oleg Zaikin +2 more
openaire +2 more sources
Accelerating First-Order Secure ML-KEM With Masked SHA-3: Cost, Randomness, and Security Evaluation
Hash functions are fundamental for ensuring authenticity and integrity in digital communications. Their importance has grown with the advent of Post-Quantum Cryptography (PQC), as many newly standardized PQC algorithms, such as ML-KEM, heavily rely on ...
Stefano Di Matteo +5 more
doaj +1 more source
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov +16 more
core +2 more sources
Model design for a reduced variant of a Trivium Type Stream Cipher
We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorithm and its variants. In particular, we study the NLFSRs used in these generators, their feedback functions and their combination.
Antonio Castro Lechtaler +5 more
doaj
La ética y estética del "Advertimiento" en la obra de Quevedo [PDF]
Quevedo's literary works display a set of variations on the anthropological and ethical dichotomy between existential awareness (“el vivir advertido”) and existential unawareness and aloofness (“la vida divertida”). As the author of hundreds of satirical
Sánchez Martínez de Pinillos, Hernán
core +2 more sources
Dos supervivientes visigóticos (Zamora, AHP, fragmentos 15 y 202) [PDF]
Els fragments 15 i 202 de l'Arxiu Històric Provincial de Zamora transmeten el nou ritu romà encara en un embolcall gràfic més aviat propi de la vella litúrgia hispànica.
Ana Suárez González
core +3 more sources
L'epistola del Ventoso e le misure della rappresentazione petrarchesca della realtà [PDF]
Nell'epistola del Ventoso Petrarca esprime non solo la prospettiva «agostiniana» di una nuova concezione, antinaturalistica etica introspettiva, del sapere ma mette in scena il superamento della rappresentazione teologico-medievale del mondo (il ...
Botti, Francesco Paolo
core +2 more sources
Curial e Güelfa, un nou món per a un nou cavaller: espais literaris en un entorn humanístic
Resum: El Curial e Güelfa és una novel·la que sorprèn per la seva modernitat. Tot i que conserva certes reminiscències medievals, com a resultat del gènere cavalleresc que la caracteritza, hem de situar-la dins de l’ambient humanista de la Itàlia del ...
Jeroni Miguel Briongos
semanticscholar +1 more source
Higher order differentiation over finite fields with applications to generalising the cube attack [PDF]
Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack of Dinur and Shamir and the AIDA attack of Vielhaber.
Ana Sălăgean +3 more
core +1 more source
On Cryptographic Attacks Using Backdoors for SAT
Propositional satisfiability (SAT) is at the nucleus of state-of-the-art approaches to a variety of computationally hard problems, one of which is cryptanalysis.
Ignatiev, Alexey +4 more
core +1 more source

