Results 11 to 20 of about 2,395,070 (371)
On Compression of Data Encrypted with Block Ciphers [PDF]
This paper investigates compression of data encrypted with block ciphers, such as the Advanced Encryption Standard (AES). It is shown that such data can be feasibly compressed without knowledge of the secret key. Block ciphers operating in various chaining modes are considered and it is shown how compression can be achieved without compromising ...
Demijan Klinc+4 more
+8 more sources
New Methodology of Block Cipher Analysis using Chaos Game [PDF]
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo+3 more
doaj +3 more sources
On some block ciphers and imprimitive groups [PDF]
The group generated by the round functions of a block ciphers is a widely investigated problem. We identify a large class of block ciphers for which such group is easily guaranteed to be primitive. Our class includes the AES and the SERPENT.
A. Caranti+2 more
openalex +4 more sources
Importance of S-Blocks in Modern Block Ciphers [PDF]
There is a new approach to determine the degree of cryptographic S-boxes suitability. This approach is based on estimating the number of transformation cycles required for a cipher to achieve differential and linear nature of the state typical for random substitution of the appropriate degree.
Lisitskaya I.V.+2 more
openalex +3 more sources
Survey of Lightweight Block Cipher [PDF]
With the rapid development of information technology,human beings are entering the era of ubiquitous connectivity,where billions of Internet of Things(IoT) devices are connected to the network.The continuous growth of network attacks targeting user ...
ZHONG Yue, GU Jieming, CAO Honglin
doaj +1 more source
New mode of operation inspired by the braid of long hair [PDF]
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA+2 more
doaj +1 more source
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj +1 more source
Chaghri - A FHE-friendly Block Cipher
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
T. Ashur, M. Mahzoun, Dilara Toprakhisar
semanticscholar +1 more source
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the ...
Yanis Belkheyar+4 more
semanticscholar +1 more source
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee+4 more
doaj +1 more source