Results 21 to 30 of about 20,803 (281)

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

Towards Low Energy Stream Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags.
Subhadeep Banik   +7 more
doaj   +1 more source

Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem.
André Schrottenloher, Marc Stevens
doaj   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Automatic method for searching impossible differentials and zero-correlation linear hulls of ARX block ciphers

open access: yes网络与信息安全学报, 2017
Firstly,the differences and linear masks propagation equations of ARX ciphers were established.Secondly,the propagation equations were solved by SAT solver and judged valid or not.Finally,differences and linear masks were traversed to search impossible ...
Ya HAN
doaj   +3 more sources

Algebraic Techniques in Differential Cryptanalysis [PDF]

open access: yes, 2008
. In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic relations arising from differential characteristics to speed up and ...
Albrecht, Martin, Cid, Carlos
core   +5 more sources

Hybrid Code Lifting on Space-Hard Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2022
There is a high demand for whitebox cryptography from the practical use of encryption in untrusted environments. It has been actively discussed for two decades since Chow et al. presented the whitebox implementation of DES and AES. The goal is to resist
Yosuke Todo, Takanori Isobe
doaj   +1 more source

Automatic method for searching integral distinguishers of ARX block ciphers

open access: yesTongxin xuebao, 2018
Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored ...
Ya HAN, Mingsheng WANG
doaj   +2 more sources

Improved Correlation Power Analysis on Bitslice Block Ciphers

open access: yesIEEE Access, 2022
Bitslice block ciphers have the advantage of allowing parallel computation using bitwise logical operations, and Boolean masking can be applied efficiently.
Jaeseung Han   +4 more
doaj   +1 more source

Cryptanalysis of HALFLOOP Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establishment (ALE) messages in high frequency radio, a technology commonly used by the military, other government agencies and industries which require high ...
Gregor Leander   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy