Results 21 to 30 of about 6,520 (191)

Enhancing Differential-Linear Cryptanalysis [PDF]

open access: yes, 2002
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linear relations. In 1994, Langford and Hellman showed that both kinds of analysis can be combined together by a technique called differential-linear cryptanalysis, in which the ...
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Wave-Shaped Round Functions and Primitive Groups [PDF]

open access: yes, 2018
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo   +4 more
core   +2 more sources

Quantum Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2016
Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities.
Marc Kaplan   +3 more
doaj   +1 more source

Differential-Linear Cryptanalysis of Serpent [PDF]

open access: yes, 2003
Serpent is a 128-bit SP-Network block cipher consisting of 32 rounds with variable key length (up to 256 bits long). It was selected as one of the 5 AES finalists. The best known attack so far is a linear attack on an 11-round reduced variant.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Multidimensional Differential-Linear Cryptanalysis of ARIA Block Cipher [PDF]

open access: yesETRI Journal, 2017
ARIA is a 128-bit block cipher that has been selected as a Korean encryption standard.
Wentan Yi, Jiongjiong Ren, Shaozhen Chen
openaire   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

System approach to disparity estimation [PDF]

open access: yes, 1995
A system approach to disparity estimation using dynamic programming is presented. The four step system can calculate a dense correspondence map between a stereo pair with parallel or nonparallel camera geometry.
Cosmas, J, Panis, S, Ziegler, M
core   +1 more source

Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)

open access: yesJurnal Matematika, 2016
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj   +1 more source

Cryptanalysis of NBC-128

open access: yesDianzi Jishu Yingyong, 2021
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai   +3 more
doaj   +1 more source

Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

open access: yesIACR Transactions on Symmetric Cryptology, 2021
When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cryptanalysis and the linear trails in the linear cryptanalysis.
Rui Zong   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy