Results 31 to 40 of about 6,566 (183)

Distribution of the best nonzero differential and linear approximations of s-box functions

open access: yesJournal of Telecommunications and Information Technology, 2006
In the paper the differential and the linear approximations of two classes of s-box functions are considered. The classes are the permutations and arbitrary functions with n binary inputs and m binary outputs, where 1≤n=m≤10.
Krzysztof Chmiel
doaj   +1 more source

Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Symmetric-key primitives designed over the prime field Fp with odd characteristics, rather than the traditional Fn2 , are becoming the most popular choice for MPC/FHE/ZK-protocols for better efficiencies.
Shiyao Chen   +6 more
doaj   +1 more source

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

A Methodology for Differential-Linear Cryptanalysis and Its Applications [PDF]

open access: yesDesigns, Codes and Cryptography, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Machine learning-aided differential-linear attacks with applications to Des and Speck32/64

open access: yesJournal of King Saud University: Computer and Information Sciences
In CRYPTO 2019, Gohr introduced machine learning-aided differential cryptanalysis, demonstrating superior performance in key-recovery attacks compared to traditional methods. This advancement has sparked significant interest in exploring the potential of
Ze-zhou Hou   +2 more
doaj   +1 more source

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher   +2 more
doaj   +1 more source

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT

open access: yesIEEE Access, 2019
GIFT is a lightweight block cipher that was proposed by Banik et al. at CHES 2017, which is said to be a direct improvement over PRESENT since “that provides a much increased efficiency in all domains (smaller and faster)” and improves the ...
Meichun Cao, Wenying Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy