Results 31 to 40 of about 44,378 (278)

Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)

open access: yesJurnal Matematika, 2016
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj   +1 more source

Cryptanalysis of Knapsack Cipher Using Genetic Algorithm [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2007
This research offers a new method in Cryptanalysis of knapsack cipher. It focuses on the application of genetic algorithm as a modern way in solving complex problems (problems have a huge numbers of alternate solutions in appropriate time).
Subhi Hamdon   +2 more
doaj   +1 more source

Nonlinear Approximations in Cryptanalysis Revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2018
This work studies deterministic and non-deterministic nonlinear approximations for cryptanalysis of block ciphers and cryptographic permutations and embeds it into the well-understood framework of linear cryptanalysis.
Christof Beierle   +2 more
doaj   +1 more source

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock [PDF]

open access: yes, 2013
LBlock is a lightweight block cipher proposed in ACNS 2011. It has a 64-bit block size and 80-bit key size which is the typical parameter setting accepted by most of the recent proposed lightweight block ciphers. It has fast hardware implementation efficiency and it still remains rather secure considering the recent results and the security margin it ...
Atsuko Miyaji, Jiageng Chen
openaire   +3 more sources

The complexity of MinRank [PDF]

open access: yes, 2019
In this note, we leverage some of our results from arXiv:1706.06319 to produce a concise and rigorous proof for the complexity of the generalized MinRank Problem in the under-defined and well-defined case.
Caminata, Alessio, Gorla, Elisa
core   +2 more sources

Cryptanalysis of Vortex [PDF]

open access: yes, 2009
Vortex is a hash function that was first presented at ISC'2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers.
Aumasson, Jean-Philippe   +4 more
openaire   +2 more sources

Differential Cryptanalysis of Lucifer [PDF]

open access: yesJournal of Cryptology, 1996
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ishai Ben-Aroya, Eli Biham
openaire   +3 more sources

Cryptanalysis of “MAKE” [PDF]

open access: yesJournal of Mathematical Cryptology, 2022
AbstractRahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product ofn×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ofn2{n}^{2}linear equations.
Brown Daniel R. L.   +2 more
openaire   +2 more sources

Security Analysis of Lightweight IoT Cipher: Chaskey

open access: yesCryptography, 2020
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree search based heuristic approach. ARX algorithms are suitable for resource-constrained devices such as IoT and very resistant to standard cryptanalysis such as ...
Ashutosh Dhar Dwivedi
doaj   +1 more source

Home - About - Disclaimer - Privacy