Results 51 to 60 of about 30,889 (254)

Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 3, March 2025.
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim   +3 more
wiley   +1 more source

Cryptanalysis of McGuffin [PDF]

open access: yes, 1995
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to differential cryptanalysis as the DES.
Rijmen, Vincent, Preneel, Bart
openaire   +3 more sources

Cryptanalysis of NORX v2.0 [PDF]

open access: yesJournal of Cryptology, 2017
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing. It is based on the sponge construction and relies on a simple permutation that allows efficient and versatile implementations.
Chaigneau, Colin   +4 more
openaire   +7 more sources

Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups [PDF]

open access: yesarXiv, 2023
There are many group-based cryptosystems in which the security relies on the difficulty of solving Conjugacy Search Problem (CSP) and Simultaneous Conjugacy Search Problem (SCSP) in their underlying platform groups. In this paper we give a cryptanalysis of these systems which use certain semidirect product of abelian groups.
arxiv  

Cryptanalysis of a one round chaos-based Substitution Permutation Network

open access: yes, 2012
The interleaving of chaos and cryptography has been the aim of a large set of works since the beginning of the nineties. Many encryption proposals have been introduced to improve conventional cryptography. However, many proposals possess serious problems
Arroyo, David   +2 more
core   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Cryptanalysis of Twister [PDF]

open access: yes, 2009
In this paper, we present a semi-free-start collision attack on the compression function for all Twister variants with negligible complexity. We show how this compression function attack can be extended to construct collisions for Twister-512 slightly faster than brute force search.
Mendel, Florian   +2 more
openaire   +2 more sources

Differential Cryptanalysis of Lucifer [PDF]

open access: yesJournal of Cryptology, 1996
Differential cryptanalysis was introduced as an approach to analyze the security of DES-like cryptosystems. The first example of a DES-like cryptosystem was Lucifer, the direct predecessor of DES, which is still believed by many people to be much more secure than DES, since it has 128 key bits, and since no attacks against (the full variant of) Lucifer
Ishai Ben-Aroya, Eli Biham
openaire   +2 more sources

Improved machine learning-aided linear cryptanalysis: application to DES

open access: yesCybersecurity
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou   +2 more
doaj   +1 more source

A Review on Biological Inspired Computation in Cryptology [PDF]

open access: yes, 2005
Cryptology is a field that concerned with cryptography and cryptanalysis. Cryptography, which is a key technology in providing a secure transmission of information, is a study of designing strong cryptographic algorithms, while cryptanalysis is a study ...
Ibrahim, Subariah, Maarof, Mohd Aizaini
core  

Home - About - Disclaimer - Privacy