Results 31 to 40 of about 44,378 (278)
Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj +1 more source
Cryptanalysis of Knapsack Cipher Using Genetic Algorithm [PDF]
This research offers a new method in Cryptanalysis of knapsack cipher. It focuses on the application of genetic algorithm as a modern way in solving complex problems (problems have a huge numbers of alternate solutions in appropriate time).
Subhi Hamdon +2 more
doaj +1 more source
Nonlinear Approximations in Cryptanalysis Revisited
This work studies deterministic and non-deterministic nonlinear approximations for cryptanalysis of block ciphers and cryptographic permutations and embeds it into the well-understood framework of linear cryptanalysis.
Christof Beierle +2 more
doaj +1 more source
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock [PDF]
LBlock is a lightweight block cipher proposed in ACNS 2011. It has a 64-bit block size and 80-bit key size which is the typical parameter setting accepted by most of the recent proposed lightweight block ciphers. It has fast hardware implementation efficiency and it still remains rather secure considering the recent results and the security margin it ...
Atsuko Miyaji, Jiageng Chen
openaire +3 more sources
The complexity of MinRank [PDF]
In this note, we leverage some of our results from arXiv:1706.06319 to produce a concise and rigorous proof for the complexity of the generalized MinRank Problem in the under-defined and well-defined case.
Caminata, Alessio, Gorla, Elisa
core +2 more sources
Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers.
Aumasson, Jean-Philippe +4 more
openaire +2 more sources
Differential Cryptanalysis of Lucifer [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ishai Ben-Aroya, Eli Biham
openaire +3 more sources
AbstractRahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product ofn×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ofn2{n}^{2}linear equations.
Brown Daniel R. L. +2 more
openaire +2 more sources
Security Analysis of Lightweight IoT Cipher: Chaskey
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree search based heuristic approach. ARX algorithms are suitable for resource-constrained devices such as IoT and very resistant to standard cryptanalysis such as ...
Ashutosh Dhar Dwivedi
doaj +1 more source

