Results 41 to 50 of about 33,779 (275)

The complexity of MinRank [PDF]

open access: yes, 2019
In this note, we leverage some of our results from arXiv:1706.06319 to produce a concise and rigorous proof for the complexity of the generalized MinRank Problem in the under-defined and well-defined case.
Caminata, Alessio, Gorla, Elisa
core   +2 more sources

(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley   +1 more source

Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]

open access: yes, 2013
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii   +1 more
core  

Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li   +5 more
wiley   +1 more source

Improved machine learning-aided linear cryptanalysis: application to DES

open access: yesCybersecurity
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou   +2 more
doaj   +1 more source

Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Draco is a lightweight small‐state stream cipher proposed in 2022. It is designed to provide a 128‐bit security level and be provably secure against time‐memory‐data trade‐off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks.
Ziyu Guan   +5 more
wiley   +1 more source

Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?

open access: yesIEEE Access
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for ...
Jonathan Cook   +2 more
doaj   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Machine learning-aided differential-linear attacks with applications to Des and Speck32/64

open access: yesJournal of King Saud University: Computer and Information Sciences
In CRYPTO 2019, Gohr introduced machine learning-aided differential cryptanalysis, demonstrating superior performance in key-recovery attacks compared to traditional methods. This advancement has sparked significant interest in exploring the potential of
Ze-zhou Hou   +2 more
doaj   +1 more source

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy