Results 41 to 50 of about 44,378 (278)

ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS

open access: yesBarekeng, 2023
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj   +1 more source

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

Cryptanalysis of FlexAEAD [PDF]

open access: yes, 2020
This paper analyzes the internal keyed permutation of FlexAEAD which is a round-1 candidate of the NIST LightWeight Cryptography Competition. In our analysis, we report an iterated truncated differential leveraging on a particular property of the AES S-box that becomes useful due to the particular nature of the diffusion layer of the round function ...
Goutam Paul   +2 more
openaire   +2 more sources

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz   +2 more
doaj   +1 more source

Letter counting: a stem cell for Cryptology, Quantitative Linguistics, and Statistics [PDF]

open access: yes, 2012
Counting letters in written texts is a very ancient practice. It has accompanied the development of Cryptology, Quantitative Linguistics, and Statistics. In Cryptology, counting frequencies of the different characters in an encrypted message is the basis
Ycart, Bernard
core   +2 more sources

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

Cryptanalysis Knapsack Cipher Using Artificial Immune System [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
In this work, the use of an artificial immune system (AIS ) in  cryptanalysis  is explored. This AIS uses the clonal selection principle for the cryptanalysis of knapsack cipher.
Eman Al-Obaidy
doaj   +1 more source

Cryptanalysis of NBC-128

open access: yesDianzi Jishu Yingyong, 2021
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai   +3 more
doaj   +1 more source

Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]

open access: yes, 2015
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge   +4 more
core   +1 more source

Concrete quantum cryptanalysis of binary elliptic curves

open access: yesIACR Cryptology ePrint Archive, 2020
This paper analyzes and optimizes quantum circuits for computing discrete logarithms on binary elliptic curves, including reversible circuits for fixed-base-point scalar multiplication and the full stack of relevant subroutines.
Gustavo Banegas   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy