Results 101 to 110 of about 30,889 (254)

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +3 more
doaj   +1 more source

New method of colour image encryption using triple chaotic maps

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3262-3276, 16 October 2024.
Initially, the plain image is decomposed into the RGB format. An individual chaotic map is used in the permutation and diffusion of each map to break the correlations in the plain image. Lorenz, 2D‐Logistic, and Henon maps are used in different orders and with different orders of channels, producing a cipher image with the properties of randomness and ...
Khalid M. Hosny   +5 more
wiley   +1 more source

Cryptanalysis of LOKI 91

open access: yesDAIMI Report Series, 1993
In this paper we examine the redesign of LOKI, LOKI91 proposed by Brown et al. First it is shown that there is no characteristic with a probability high enough to do a successful differential attack on LOKI91. Secondly we show that the size of the image of the F-function in LOKI91 is 8\22*2^32.
openaire   +3 more sources

Cryptanalysis of SDES via evolutionary computation techniques [PDF]

open access: yesIJCSIS May 2009 Issue, Vol. 1, No. 1, 2009
The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. The goal of this paper is two fold. First we want to make a study about how evolutionary computation techniques can efficiently solve the NP-Hard combinatorial problem.
arxiv  

Cryptanalysis of dynamic look-up table based chaotic cryptosystems [PDF]

open access: yes, 2003
In recent years many chaotic cryptosystems based on Baptista's seminal work have been proposed. We analyze the security of two of the newest and most interesting ones, which use a dynamically updated look-up table and also work as stream ciphers. We provide different attack techniques to recover the keystream used by the algorithms.
arxiv   +1 more source

Cross‐disciplinary mathematical modelling to benefit healthcare – could clinical pharmacology play an enabling role?

open access: yesBritish Journal of Clinical Pharmacology, Volume 90, Issue 10, Page 2509-2516, October 2024.
Abstract Clinical pharmacology is often the nexus in any cross‐disciplinary team that is seeking solutions for human healthcare issues. The use and application of real‐world data and artificial intelligence to better understand our ecosystem has influenced our view at the world and how we do things.
Tirhani Maluleke   +13 more
wiley   +1 more source

Quantum impossible differential and truncated differential cryptanalysis [PDF]

open access: yesarXiv, 2017
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
arxiv  

Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers [PDF]

open access: yes, 2011
Cryptolysis is a framework that includes a collection of automated attacks on the classical ciphers based on the article by Clark Dawson on Optimisation heuristics for the automated cryptanalysis of classical ciphers from the Journal of Combinatorial Mathematics and Combinatorial Computing, 1998.
arxiv   +1 more source

Cryptanalysis of LOKI

open access: yesDAIMI Report Series, 1992
<p>In 1990 Brown, Pieprzyk and Seberry proposed a new encryption primitive, which encrypts and decrypts a 64-bit block of data using a 64-bit key. Furthermore they propose a way to build private versions of LOKI.</p><p>In this paper we show first that the keyspace of any LOKI-version is only 2^60, not 2^64 as claimed.
openaire   +4 more sources

Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG [PDF]

open access: yesarXiv, 2008
A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized.
arxiv  

Home - About - Disclaimer - Privacy