Results 91 to 100 of about 33,779 (275)
Secrecy in the American Revolution
This paper analyzes how the use of various cryptographic and cryptanalytic techniques affected the American Revolution. By examining specific instances of and each country\u27s general approaches to cryptography and cryptanalysis, it is determined that ...
Minzer, Abigail N.
core
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher. Here we introduce polytopic cryptanalysis which considers interdependencies between larger sets of texts as they traverse through the cipher. We prove that the methodology of
openaire +3 more sources
Influence of Non-Linearity on Selected Cryptographic Criteria of 8x8 S-Boxes
The article defines standard criteria used to characterize the cryptographic quality of the S box: regularity, non linearity, autocorrelation, avalanche and immunity against differential cryptanalysis.
Petr Tesař
doaj +1 more source
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core
Cryptanalysis of 2R− Schemes [PDF]
In this paper, we study the security of 2R− schemes [17,18], which are the “minus variant” of two-round schemes. This variant consists in removing some of the n polynomials of the public key, and permits to thwart an attack described at Crypto'99 [25] against two-round schemes.
Faugère, Jean-Charles, Perret, Ludovic
openaire +2 more sources
Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT
GIFT is a lightweight block cipher that was proposed by Banik et al. at CHES 2017, which is said to be a direct improvement over PRESENT since “that provides a much increased efficiency in all domains (smaller and faster)” and improves the security ...
Meichun Cao, Wenying Zhang
semanticscholar +1 more source
Distributed computations are considered as a tool of cryptanalysis. It is shown that time of implementation of “meet in the middle of attack” method using distributed computations designed for cryptanalysis of some class of iterative symmetric block ...
V. M. Fomichev
doaj
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s legendary timestamp-based remote authentication scheme using smart cards.
Hong, Choong Seon, Pathan, Al-Sakib Khan
core
Differential cryptanalysis of image cipher using block-based scrambling and image filtering [PDF]
Feng Yu +3 more
openalex +1 more source

