Results 91 to 100 of about 26,610 (180)

Revisiting the shuffle of generalized Feistel structure

open access: yesCybersecurity
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen   +4 more
doaj   +1 more source

Quantum Automated Tools for Finding Impossible Differentials

open access: yesMathematics
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie   +4 more
doaj   +1 more source

Cryptanalysis of Selected ARX-Based Block Ciphers

open access: yesVietnam Journal of Computer Science
The security of digital communication and information systems is mostly dependent on block ciphers. ARX-based ciphers are widely used due to their simplicity and efficiency.
Praveen Kumar Gundaram
doaj   +1 more source

Comments on “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs”

open access: yesIEEE Access
In the above paper “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs,” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed.
Je Hong Park, Bonwook Koo
doaj   +1 more source

Parallel cryptanalysis

open access: yes, 2012
Most of today’s cryptographic primitives are based on computations that are hard to perform for a potential attacker but easy to perform for somebody who is in possession of some secret information, the key, that opens a back door in these hard computations and allows them to be solved in a small amount of time.
openaire   +1 more source

SOBER Cryptanalysis [PDF]

open access: yes, 1999
Daniel Bleichenbacher, Sarvar Patel
openaire   +1 more source

Home - About - Disclaimer - Privacy