Results 121 to 130 of about 44,378 (278)
Cryptanalysis of Reduced round SKINNY Block Cipher
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
S. Sadeghi, Tahere Mohammadi, N. Bagheri
semanticscholar +1 more source
Distributed computations are considered as a tool of cryptanalysis. It is shown that time of implementation of “meet in the middle of attack” method using distributed computations designed for cryptanalysis of some class of iterative symmetric block ...
V. M. Fomichev
doaj
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s legendary timestamp-based remote authentication scheme using smart cards.
Hong, Choong Seon, Pathan, Al-Sakib Khan
core
Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, K. Sun
semanticscholar +1 more source
Radio frequency identification systems which use radio frequency for object identification are widely developed nowadays. Security problems such as privacy and untraceability had lead to propose numerous protocols for RFID systems. However most of these attempts have not been successful.In this paper we present a desynchronization attack against a ...
Nasour Bagheri +2 more
openaire +3 more sources
Cryptanalysis of the Ajtai-Dwork cryptosystem [PDF]
P.H. Nguyen, Jacques Stern
openalex +1 more source
Related-Key Differential Attacks on COSB-128
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept.
Song Dat Phuc Tran, Changhoon Lee
doaj +1 more source
Problems with the linear cryptanalysis of DES using more than one active S-box per round [PDF]
Uwe Blöcher, Markus Dichtl
openalex +1 more source
Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC [PDF]
Zong Duo Dai +2 more
openalex +1 more source

