Results 11 to 20 of about 33,779 (275)

Cryptanalysis of LowMC instances using single plaintext/ciphertext pair

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Arguably one of the main applications of the LowMC family ciphers is in the post-quantum signature scheme PICNIC. Although LowMC family ciphers have been studied from a cryptanalytic point of view before, none of these studies were directly concerned ...
Subhadeep Banik   +3 more
doaj   +2 more sources

Unique Aspects of Usage of the Quadratic Cryptanalysis Method to the GOST 28147-89 Encryption Algorithm

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2022
In this article, issues related to the application of the quadratic cryptanalysis method to the five rounds of GOST 28147-89 encryption algorithm are given.
Bardosh Akhmedov, Rakhmatillo Aloev
doaj   +1 more source

Some cryptanalytic results on Lizard

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120-bit secret key and a 64-bit IV.
Subhadeep Banik   +3 more
doaj   +1 more source

Quantum differential cryptanalysis [PDF]

open access: yesQuantum Information Processing, 2015
9 pages, 3 ...
Zhou, Qing   +3 more
openaire   +2 more sources

Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (232)) and High Irreducible Polynomials

open access: yesApplied Sciences, 2023
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine   +1 more
doaj   +1 more source

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Multidimensional Linear Cryptanalysis [PDF]

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hermelin, Miia   +2 more
openaire   +2 more sources

Intelligent Techniques in Cryptanalysis: Review and Future Directions

open access: yesUHD Journal of Science and Technology, 2017
In this paper, we consider the use of some intelligent techniques such as artificial neural networks (ANNs) and genetic algorithms (GAs) in solving various cryptanalysis problems.
Sufyan T. Al-Janabi   +2 more
doaj   +1 more source

Feasibility study of genetic algorithms application for implementation of block cryptosystem cryptanalysis

open access: yesAdvanced Engineering Research, 2015
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the ...
Yury O. Chernyshev   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy