Results 121 to 130 of about 44,378 (278)

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Cryptology ePrint Archive, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
S. Sadeghi, Tahere Mohammadi, N. Bagheri
semanticscholar   +1 more source

About Method “Meet in Middle of Attack” for Cryptanalysis of Block Ciphers by means of Distributed Computations

open access: yesБезопасность информационных технологий, 2011
Distributed computations are considered as a tool of cryptanalysis. It is shown that time of implementation of “meet in the middle of attack” method using distributed computations designed for cryptanalysis of some class of iterative symmetric block ...
V. M. Fomichev
doaj  

Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards

open access: yes, 2008
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s legendary timestamp-based remote authentication scheme using smart cards.
Hong, Choong Seon, Pathan, Al-Sakib Khan
core  

Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps

open access: yesEntropy, 2018
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, K. Sun
semanticscholar   +1 more source

Cryptanalysis of AFMAP

open access: yesIEICE Electronics Express, 2010
Radio frequency identification systems which use radio frequency for object identification are widely developed nowadays. Security problems such as privacy and untraceability had lead to propose numerous protocols for RFID systems. However most of these attempts have not been successful.In this paper we present a desynchronization attack against a ...
Nasour Bagheri   +2 more
openaire   +3 more sources

Partitioning cryptanalysis [PDF]

open access: bronze, 1997
Carlo Harpes, James L. Massey
openalex   +1 more source

Related-Key Differential Attacks on COSB-128

open access: yesInternational Journal of Distributed Sensor Networks, 2015
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept.
Song Dat Phuc Tran, Changhoon Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy