Results 151 to 160 of about 26,610 (180)

Guessing less and better: improved attacks on GIFT-64. [PDF]

open access: yesDes Codes Cryptogr
Canale F, Naya-Plasencia M.
europepmc   +1 more source

Acoustic Cryptanalysis

Journal of Cryptology, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Genkin, Daniel   +2 more
openaire   +2 more sources

Cryptanalysis

2002
Item does not contain ...
Daemen, J., Rijmen, V.
openaire   +2 more sources

Cryptanalysis of Rabbit

2008
The stream cipher Rabbit is one candidate to the ECRYPT Stream Cipher Project (eSTREAM) on the third evaluation phase. It has a 128-bit key, 64-bit IV and 513-bit internal state. Currently, only one paper [1] studied it besides a series of white papers by the authors of Rabbit.
Lu Y., Wang H., Ling S.
openaire   +1 more source

Yoyo cryptanalysis on Future

International Journal of Applied Cryptography
Summary: In [Lect. Notes Comput. Sci. 10624, 217--243 (2017; Zbl 1420.94094)], \textit{S. Rønjom} et al. reported Yoyo tricks on generic rounds of SPNs. Then they applied it to AES and found the most effective way to distinguish AES in several rounds. \textit{R. Saha} et al. [Secur. Commun. Netw.
Mondal, Sandip Kumar   +3 more
openaire   +2 more sources

Automated Cryptanalysis

2009
Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. One of the pertinent problems arising in automated cryptanalysis is the plaintext recognition.
Otokar Grošek, Pavol Zajac
openaire   +1 more source

Home - About - Disclaimer - Privacy