Results 21 to 30 of about 30,889 (254)
Algebraic Cryptanalysis with MRHS Equations
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis).
Pavol Zajac
doaj +1 more source
In this article, issues related to the application of the quadratic cryptanalysis method to the five rounds of GOST 28147-89 encryption algorithm are given.
Bardosh Akhmedov, Rakhmatillo Aloev
doaj +1 more source
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine+1 more
doaj +1 more source
Some cryptanalytic results on Lizard
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120-bit secret key and a 64-bit IV.
Subhadeep Banik+3 more
doaj +1 more source
Cryptography is one of the common approaches to secure private data and cryptanalysis involves breaking down a coded cipher text without having the key.
Arkan Kh Shakr Sabonchi*, Bahriye Akay
doaj +1 more source
Intelligent Techniques in Cryptanalysis: Review and Future Directions
In this paper, we consider the use of some intelligent techniques such as artificial neural networks (ANNs) and genetic algorithms (GAs) in solving various cryptanalysis problems.
Sufyan T. Al-Janabi+2 more
doaj +1 more source
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the ...
Yury O. Chernyshev+3 more
doaj +1 more source
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission.
Ting Fan+3 more
doaj +1 more source
On the Cryptanalysis of a Latin Cubes-Based Image Cryptosystem
Based on orthogonal Latin cubes, an image cryptosystem with confusion–diffusion–confusion cipher architecture has been proposed recently (Inf. Sci.2019, 478, 1–14).
Rong Huang+3 more
doaj +1 more source
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 40 and 61 bits. In spite of this, the cipher does not seem to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design.
Banik, Subhadeep+2 more
openaire +5 more sources