Results 11 to 20 of about 33,779 (275)
Cryptanalysis of LowMC instances using single plaintext/ciphertext pair
Arguably one of the main applications of the LowMC family ciphers is in the post-quantum signature scheme PICNIC. Although LowMC family ciphers have been studied from a cryptanalytic point of view before, none of these studies were directly concerned ...
Subhadeep Banik +3 more
doaj +2 more sources
In this article, issues related to the application of the quadratic cryptanalysis method to the five rounds of GOST 28147-89 encryption algorithm are given.
Bardosh Akhmedov, Rakhmatillo Aloev
doaj +1 more source
Some cryptanalytic results on Lizard
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120-bit secret key and a 64-bit IV.
Subhadeep Banik +3 more
doaj +1 more source
Quantum differential cryptanalysis [PDF]
9 pages, 3 ...
Zhou, Qing +3 more
openaire +2 more sources
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine +1 more
doaj +1 more source
Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj +1 more source
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel +3 more
core +3 more sources
Multidimensional Linear Cryptanalysis [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hermelin, Miia +2 more
openaire +2 more sources
Intelligent Techniques in Cryptanalysis: Review and Future Directions
In this paper, we consider the use of some intelligent techniques such as artificial neural networks (ANNs) and genetic algorithms (GAs) in solving various cryptanalysis problems.
Sufyan T. Al-Janabi +2 more
doaj +1 more source
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the ...
Yury O. Chernyshev +3 more
doaj +1 more source

