Results 241 to 250 of about 44,378 (278)
Some of the next articles are maybe not open access.

Cryptanalysis of KLEIN

2015
Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn
Lallemand, Virginie   +1 more
openaire   +3 more sources

Cryptanalysis of MD2 [PDF]

open access: possibleJournal of Cryptology, 2009
This paper considers the hash function MD2 which was developed by Ron Rivest in 1989. Despite its age, MD2 has withstood cryptanalytic attacks until recently. This paper contains the state-of-the-art cryptanalytic results on MD2, in particular collision and preimage attacks on the full hash function, the latter having complexity 273, which should be ...
Søren S. Thomsen   +3 more
openaire   +1 more source

Cryptanalysis of FIDES

2015
FIDES is a lightweight authenticated cipher, presented at CHES 2013. The cipher has two version, providing either 80-bit or 96-bit security. In this paper, we describe internal state-recovery attacks on both versions of FIDES, and show that once we recover the internal state, we can use it to immediately forge any message.
Dinur, Itai, Jean, Jérémy
openaire   +3 more sources

Exhaustive Cryptanalysis of the NBS Data Encryption Standard

Democratizing Cryptography, 2022
W. Diffie, M. Hellman
semanticscholar   +1 more source

A Deeper Look at Machine Learning-Based Cryptanalysis

IACR Cryptology ePrint Archive, 2021
Adrien Benamira   +3 more
semanticscholar   +1 more source

Differential Cryptanalysis in the Fixed-Key Model

IACR Cryptology ePrint Archive, 2022
Tim Beyne, V. Rijmen
semanticscholar   +1 more source

Enhancing Differential-Neural Cryptanalysis

International Conference on the Theory and Application of Cryptology and Information Security, 2022
Zhenzhen Bao   +4 more
semanticscholar   +1 more source

Cryptanalysis of Pomaranch

IEE Proceedings - Information Security, 2006
Pomaranch is a synchronous stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher is constructed as a cascade clock control sequence generator, which is based on the notion of jump registers. We present an attack which exploits the cipher’s initialisation procedure to recover the 128-bit secret key.
Thomas Johansson   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy