Results 81 to 90 of about 30,889 (254)

Cryptanalysis of the Sidelnikov Cryptosystem [PDF]

open access: yes, 2007
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effective if the parameters of the Reed-Muller code allow for efficient sampling of minimum weight codewords. For example, the length 2048, 3rd-order Reed-Muller code as proposed in [
Minder, Lorenz, Shokrollahi, Amin
openaire   +2 more sources

Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128

open access: yesJournal of Applied Mathematics, 2014
Biclique cryptanalysis is an attack which reduces the computational complexity by finding a biclique which is a kind of bipartite graph. We show a single-key full-round attack of the Crypton-256 and mCrypton-128 by using biclique cryptanalysis.
Junghwan Song   +2 more
doaj   +1 more source

Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving

open access: yesAdvanced Engineering Research, 2017
Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis.
Yury O Chernyshev   +3 more
doaj   +1 more source

An improvement of a cryptanalysis algorithm [PDF]

open access: yesarXiv, 2014
In this paper we present experiments in order to show how some pseudo random number generators can improve the effectiveness of a statistical cryptanalysis algorithm. We deduce mainly that a better generator enhance the accuracy of the cryptanalysis algorithm.
arxiv  

Linear cryptanalysis of pseudorandom functions [PDF]

open access: yes, 2015
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block ciphers from the key input to the ciphertext (for a fixed plaintext block).
Freitas, Daniel Santana de   +2 more
core  

Compressive sensing and DNA coding operation: Revolutionary approach to colour medical image compression‐encryption algorithm

open access: yesIET Image Processing, Volume 18, Issue 14, Page 4589-4606, 11 December 2024.
Randomness and sparse optimizations are applied to three floating‐point matrices obtained from discrete wavelet and sparse transforms of plain colour medical images. These matrices are then quantized into 8‐bit integer matrices and undergo deoxyribonucleic acid encoding, scrambling, XOR, and decoding to achieve base‐position scrambling and value ...
Xianglian Xue, Haiyan Jin, Changjun Zhou
wiley   +1 more source

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for cryptographic memory protection and control flow integrity.
Hadipour, Hosein, Todo, Yosuke
openaire   +3 more sources

Key‐dependent side‐channel cube attack on CRAFT

open access: yesETRI Journal, 2021
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang   +1 more
doaj   +1 more source

Quantum calculi and formalisms for system and network security: A bibliographic insights and synoptic review

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 486-515, December 2024.
Quantum calculi and formalisms aid in designing and analysing new cryptographic protocols for blockchain, assessing the feasibility and security of quantum algorithms, and building a quantum‐safe blockchain system. Bibliometric analysis is performed using R language and automated tools to identify key institutions, authors, organisations, and ...
Adarsh Kumar   +2 more
wiley   +1 more source

CRYPTANALYSIS OF HYBRID CRYPTOSYSTEMS [PDF]

open access: yesInternational Journal of Bifurcation and Chaos, 2013
An essential issue for the validation of ciphers is cryptanalysis, that is, the study of attacks in order to reveal possible weaknesses. In this paper, we propose a systematic and unified methodology for cryptanalyzing known chaos-based cryptosystems borrowed from the open literature, namely shift keying, discrete parameter modulation, switched ...
openaire   +4 more sources

Home - About - Disclaimer - Privacy