Results 21 to 30 of about 1,151 (262)

Single-Byte Error-Based Practical Differential Fault Attack on Bit-Sliced Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
With the recent development of the Internet of Things (IoT), related device use is increasing rapidly. As a result, accessing and hijacking the devices is an increasing security threat.
Seonghyuck Lim   +2 more
doaj   +1 more source

Grover on Korean Block Ciphers

open access: yesApplied Sciences, 2020
The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover search algorithm, the target block cipher should be efficiently implemented in quantum circuits ...
Kyoungbae Jang   +5 more
doaj   +1 more source

The influence of S-boxes on the arrival of the cipher to the state of random substitution

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is the process of developing block symmetric ciphers with improved cryptographic stability indicators for solving the problems of information protection in information and communication systems.
Iryna Lysytska   +3 more
doaj   +1 more source

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj   +1 more source

Probabilistic Block Cipher [PDF]

open access: yesAnnals of Computer Science and Information Systems, 2018
This paper is devoted to the description of a new block cipher that will be applicable in the post-quantum era and will not need a lot of resources. The main advantages: probabilistic encryption, the cipher block chaining mode, the ability to transfer to distributed systems. All this combined with the use of PRNG, working on the Cremona transformations,
Dmitry Shishlyannikov   +2 more
openaire   +2 more sources

RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Algebraic Fault Analysis (AFA) is a cryptanalysis for block ciphers proposed by Courtois et al., which incorporates algebraic cryptanalysis to overcome the complexity of manual analysis within the context of Differential Fault Analysis (DFA).
Zehong (Zephyr) Qiu, Fan Zhang
doaj   +1 more source

Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem.
André Schrottenloher, Marc Stevens
doaj   +1 more source

Towards Low Energy Stream Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags.
Subhadeep Banik   +7 more
doaj   +1 more source

STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO

open access: yesScientific Journal of Astana IT University, 2022
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh   +3 more
doaj   +1 more source

Automatic method for searching impossible differentials and zero-correlation linear hulls of ARX block ciphers

open access: yes网络与信息安全学报, 2017
Firstly,the differences and linear masks propagation equations of ARX ciphers were established.Secondly,the propagation equations were solved by SAT solver and judged valid or not.Finally,differences and linear masks were traversed to search impossible ...
Ya HAN
doaj   +3 more sources

Home - About - Disclaimer - Privacy