Results 151 to 160 of about 6,566 (183)
Some of the next articles are maybe not open access.
Differential-Linear Cryptanalysis Revisited
Journal of Cryptology, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Blondeau, Céline +2 more
openaire +6 more sources
Differential-Linear Cryptanalysis from an Algebraic Perspective
2021The differential-linear cryptanalysis is an important cryptanalytic tool in cryptography, and has been extensively researched since its discovery by Langford and Hellman in 1994. There are nevertheless very few methods to study the middle part where the differential and linear trail connect.
Meicheng Liu, Xiaojuan Lu, Dongdai Lin
openaire +1 more source
Differential-Linear Cryptanalysis of ICEPOLE
2015ICEPOLE is a CAESAR candidate with the intermediate level of robustness under nonce misuse circumstances in the original document. In particular, it was claimed that key recovery attack against ICEPOLE is impossible in the case of nonce misuse. ICEPOLE is strong against the differential cryptanalysis and linear cryptanalysis.
Tao Huang, Ivan Tjuawinata, Hongjun Wu
openaire +1 more source
Improving the Security of ChaCha against Differential-Linear Cryptanalysis
Anais do XX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2020), 2020The stream cipher ChaCha has received a lot of attention and recently is being used as a new cipher suite in TLS 1.3, as a random number generator for operating systems (Linux, FreeBSD, OpenBSD, NetBSD, and DragonFly BSD), a proposed standardization in RFC 7634 for use IKE and IPsec, and by the WireGuard VPN protocol.
Murilo Coutinho +3 more
openaire +1 more source
Differential-Linear Cryptanalysis of the Lightweight Cryptographic Algorithm KNOT
2021KNOT is one of the 32 candidates in the second round of NIST’s lightweight cryptography standardization process. The KNOT family consists of bit-slice lightweight Authenticated Encryption with Associated Data (AEAD) and hashing algorithms. In this paper, we evaluate the security for the initialization phase of two members of the KNOT-AEAD family by ...
Shichang Wang +3 more
openaire +1 more source
Differential-Linear Cryptanalysis of Camellia
2006Camellia is the final selection of 128-bit block cipher in NESSIE. In this paper, we present differential-linear cryptanalysis of modified camellia reduced to 9 and 10 rounds. For modified camellia with 9 rounds we can find the user key with 2 14 chosen plaintexts and 2 185.5 encryptions and for modified camellia with 10 rounds we can find the user key
Wenling Wu, Dengguo Feng
openaire +1 more source
DLCT: A New Tool for Differential-Linear Cryptanalysis
2019Differential cryptanalysis and linear cryptanalysis are the two best-known techniques for cryptanalysis of block ciphers. In 1994, Langford and Hellman introduced the differential-linear (DL) attack based on dividing the attacked cipher E into two subciphers \(E_0\) and \(E_1\) and combining a differential characteristic for \(E_0\) with a linear ...
Achiya Bar-On +3 more
openaire +1 more source
Cryptography and Communications
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Zhichao +3 more
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Zhichao +3 more
openaire +1 more source
Rotational Cryptanalysis from a Differential-Linear Perspective
2021Yunwen Liu, Siwei Sun, Chao Li
openaire +1 more source
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
2022Sabyasachi Dey +3 more
openaire +1 more source

