Results 151 to 160 of about 6,520 (191)
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
Light weight encryption technique: a cellular automaton based approach for securing health records. [PDF]
Anwar S, Pranav P, Kamilya S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Differential-Linear Cryptanalysis Revisited
Journal of Cryptology, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blondeau, Céline +2 more
openaire +6 more sources
Differential-linear cryptanalysis of SIMON32/64
International Journal of Embedded Systems, 2018Simon is a family of lightweight block ciphers designed by the U.S National Security Agency in 2013. Simon 2n/k is a cipher in this family with k-bit key and 2n-bit block. So far, there have been several cryptanalytic results on this cipher by means of differential cryptanalysis, linear cryptanalysis and impossible differential cryptanalysis.
Yanqin Chen, Wenying Zhang
openaire +1 more source
Differential-Linear Cryptanalysis from an Algebraic Perspective
2021The differential-linear cryptanalysis is an important cryptanalytic tool in cryptography, and has been extensively researched since its discovery by Langford and Hellman in 1994. There are nevertheless very few methods to study the middle part where the differential and linear trail connect.
Meicheng Liu, Xiaojuan Lu, Dongdai Lin
openaire +1 more source
Differential-Linear Cryptanalysis of ICEPOLE
2015ICEPOLE is a CAESAR candidate with the intermediate level of robustness under nonce misuse circumstances in the original document. In particular, it was claimed that key recovery attack against ICEPOLE is impossible in the case of nonce misuse. ICEPOLE is strong against the differential cryptanalysis and linear cryptanalysis.
Tao Huang, Ivan Tjuawinata, Hongjun Wu
openaire +1 more source
Improving the Security of ChaCha against Differential-Linear Cryptanalysis
Anais do XX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2020), 2020The stream cipher ChaCha has received a lot of attention and recently is being used as a new cipher suite in TLS 1.3, as a random number generator for operating systems (Linux, FreeBSD, OpenBSD, NetBSD, and DragonFly BSD), a proposed standardization in RFC 7634 for use IKE and IPsec, and by the WireGuard VPN protocol.
Murilo Coutinho +3 more
openaire +1 more source
Differential-Linear Cryptanalysis of the Lightweight Cryptographic Algorithm KNOT
2021KNOT is one of the 32 candidates in the second round of NIST’s lightweight cryptography standardization process. The KNOT family consists of bit-slice lightweight Authenticated Encryption with Associated Data (AEAD) and hashing algorithms. In this paper, we evaluate the security for the initialization phase of two members of the KNOT-AEAD family by ...
Shichang Wang +3 more
openaire +1 more source
Differential-Linear Cryptanalysis of Camellia
2006Camellia is the final selection of 128-bit block cipher in NESSIE. In this paper, we present differential-linear cryptanalysis of modified camellia reduced to 9 and 10 rounds. For modified camellia with 9 rounds we can find the user key with 2 14 chosen plaintexts and 2 185.5 encryptions and for modified camellia with 10 rounds we can find the user key
Wenling Wu, Dengguo Feng
openaire +1 more source
Differential-linear and related key cryptanalysis of round-reduced scream
Information Processing Letters, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ashutosh Dhar Dwivedi +3 more
openaire +3 more sources

