Results 81 to 90 of about 30,889 (254)
Cryptanalysis of the Sidelnikov Cryptosystem [PDF]
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effective if the parameters of the Reed-Muller code allow for efficient sampling of minimum weight codewords. For example, the length 2048, 3rd-order Reed-Muller code as proposed in [
Minder, Lorenz, Shokrollahi, Amin
openaire +2 more sources
Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128
Biclique cryptanalysis is an attack which reduces the computational complexity by finding a biclique which is a kind of bipartite graph. We show a single-key full-round attack of the Crypton-256 and mCrypton-128 by using biclique cryptanalysis.
Junghwan Song+2 more
doaj +1 more source
Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis.
Yury O Chernyshev+3 more
doaj +1 more source
An improvement of a cryptanalysis algorithm [PDF]
In this paper we present experiments in order to show how some pseudo random number generators can improve the effectiveness of a statistical cryptanalysis algorithm. We deduce mainly that a better generator enhance the accuracy of the cryptanalysis algorithm.
arxiv
Linear cryptanalysis of pseudorandom functions [PDF]
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block ciphers from the key input to the ciphertext (for a fixed plaintext block).
Freitas, Daniel Santana de+2 more
core
Randomness and sparse optimizations are applied to three floating‐point matrices obtained from discrete wavelet and sparse transforms of plain colour medical images. These matrices are then quantized into 8‐bit integer matrices and undergo deoxyribonucleic acid encoding, scrambling, XOR, and decoding to achieve base‐position scrambling and value ...
Xianglian Xue, Haiyan Jin, Changjun Zhou
wiley +1 more source
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for cryptographic memory protection and control flow integrity.
Hadipour, Hosein, Todo, Yosuke
openaire +3 more sources
Key‐dependent side‐channel cube attack on CRAFT
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang+1 more
doaj +1 more source
Quantum calculi and formalisms aid in designing and analysing new cryptographic protocols for blockchain, assessing the feasibility and security of quantum algorithms, and building a quantum‐safe blockchain system. Bibliometric analysis is performed using R language and automated tools to identify key institutions, authors, organisations, and ...
Adarsh Kumar+2 more
wiley +1 more source
CRYPTANALYSIS OF HYBRID CRYPTOSYSTEMS [PDF]
An essential issue for the validation of ciphers is cryptanalysis, that is, the study of attacks in order to reveal possible weaknesses. In this paper, we propose a systematic and unified methodology for cryptanalyzing known chaos-based cryptosystems borrowed from the open literature, namely shift keying, discrete parameter modulation, switched ...
openaire +4 more sources