Results 11 to 20 of about 26,610 (180)

Some cryptanalytic results on Lizard

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120-bit secret key and a 64-bit IV.
Subhadeep Banik   +3 more
doaj   +1 more source

Quantum differential cryptanalysis [PDF]

open access: yesQuantum Information Processing, 2015
9 pages, 3 ...
Zhou, Qing   +3 more
openaire   +2 more sources

Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (232)) and High Irreducible Polynomials

open access: yesApplied Sciences, 2023
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine   +1 more
doaj   +1 more source

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

Multidimensional Linear Cryptanalysis [PDF]

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hermelin, Miia   +2 more
openaire   +2 more sources

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Intelligent Techniques in Cryptanalysis: Review and Future Directions

open access: yesUHD Journal of Science and Technology, 2017
In this paper, we consider the use of some intelligent techniques such as artificial neural networks (ANNs) and genetic algorithms (GAs) in solving various cryptanalysis problems.
Sufyan T. Al-Janabi   +2 more
doaj   +1 more source

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

On the Cryptanalysis of a Latin Cubes-Based Image Cryptosystem

open access: yesEntropy, 2021
Based on orthogonal Latin cubes, an image cryptosystem with confusion–diffusion–confusion cipher architecture has been proposed recently (Inf. Sci.2019, 478, 1–14).
Rong Huang   +3 more
doaj   +1 more source

Feasibility study of genetic algorithms application for implementation of block cryptosystem cryptanalysis

open access: yesAdvanced Engineering Research, 2015
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the ...
Yury O. Chernyshev   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy