Results 81 to 90 of about 26,610 (180)

Influence of Non-Linearity on Selected Cryptographic Criteria of 8x8 S-Boxes

open access: yesActa Informatica Pragensia, 2017
The article defines standard criteria used to characterize the cryptographic quality of the S box: regularity, non linearity, autocorrelation, avalanche and immunity against differential cryptanalysis.
Petr Tesař
doaj   +1 more source

Secrecy in the American Revolution

open access: yes, 2019
This paper analyzes how the use of various cryptographic and cryptanalytic techniques affected the American Revolution. By examining specific instances of and each country\u27s general approaches to cryptography and cryptanalysis, it is determined that ...
Minzer, Abigail N.
core  

About Method “Meet in Middle of Attack” for Cryptanalysis of Block Ciphers by means of Distributed Computations

open access: yesБезопасность информационных технологий, 2011
Distributed computations are considered as a tool of cryptanalysis. It is shown that time of implementation of “meet in the middle of attack” method using distributed computations designed for cryptanalysis of some class of iterative symmetric block ...
V. M. Fomichev
doaj  

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov   +3 more
doaj   +1 more source

A note on some algebraic trapdoors for block ciphers

open access: yes, 2018
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core  

Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards

open access: yes, 2008
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s legendary timestamp-based remote authentication scheme using smart cards.
Hong, Choong Seon, Pathan, Al-Sakib Khan
core  

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj   +1 more source

On relationship between differential/linear clustering effects and the number of active S-boxes in block ciphers

open access: yesCybersecurity
Differential cryptanalysis and linear cryptanalysis are the two best-known cryptanalysis techniques for symmetric-key primitives. Ensuring resistance to these attacks is critical for the security of block ciphers.
Ting Peng, Wentao Zhang, Jingsui Weng
doaj   +1 more source

Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps

open access: yesJournal of Informatics and Web Engineering
Chaos-based cryptography has yet to achieve practical, real-world applications despite extensive research. A major challenge is the difficulty in analysing the security of these cryptosystems, which often appear ad hoc in design.
Je Sen Teh, Abubakar Abba
doaj   +1 more source

Cryptanalysis of LowMC instances using single plaintext/ciphertext pair

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Arguably one of the main applications of the LowMC family ciphers is in the post-quantum signature scheme PICNIC. Although LowMC family ciphers have been studied from a cryptanalytic point of view before, none of these studies were directly concerned ...
Subhadeep Banik   +3 more
doaj  

Home - About - Disclaimer - Privacy