Results 21 to 30 of about 44,378 (278)

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission.
Ting Fan   +3 more
doaj   +1 more source

Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers

open access: yesSecur. Commun. Networks, 2020
Most of the traditional cryptanalytic technologies often require a great amount of time, known plaintexts, and memory. This paper proposes a generic cryptanalysis model based on deep learning (DL), where the model tries to find the key of block ciphers ...
Jaewoo So
semanticscholar   +1 more source

Cryptanalysis of MinRank [PDF]

open access: yes, 2008
In this paper, we investigate the difficulty of one of the most relevant problems in multivariate cryptography - namely MinRank - about which no real progress has been reported since [9, 19]. Our starting point is the Kipnis-Shamir attack [19]. We first show new properties of the ideal generated by Kipnis-Shamir's equations.
Faugère, Jean-Charles   +2 more
openaire   +2 more sources

Feasibility study of genetic algorithms application for implementation of block cryptosystem cryptanalysis

open access: yesAdvanced Engineering Research, 2015
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the ...
Yury O. Chernyshev   +3 more
doaj   +1 more source

On the Cryptanalysis of a Latin Cubes-Based Image Cryptosystem

open access: yesEntropy, 2021
Based on orthogonal Latin cubes, an image cryptosystem with confusion–diffusion–confusion cipher architecture has been proposed recently (Inf. Sci.2019, 478, 1–14).
Rong Huang   +3 more
doaj   +1 more source

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy [PDF]

open access: yesIEEE Access, 2018
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics.
Chengqing Li   +4 more
semanticscholar   +1 more source

Cryptanalysis of Plantlet

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 40 and 61 bits. In spite of this, the cipher does not seem to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design.
Khashayar Barooti   +2 more
openaire   +5 more sources

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Cryptanalysis of three matrix-based key establishment protocols [PDF]

open access: yes, 2011
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to ...
Blackburn, Simon R.   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy