Results 81 to 90 of about 6,566 (183)
New Experimental Results in Differential — Linear Cryptanalysis of Reduced Variants of DES [PDF]
At the beginning of the paper we give an overview of the linear and differential cryptanalysis of block ciphers. We describe two extensions of linear cryptanalysis (analysis with multiple expressions [7] and differentiallinear cryptanalysis [10] which form the basis of the conducted experiments.
Anna Górska +4 more
openaire +1 more source
An algorithm for constructing S-boxes for block symmetric encryption
This article presents an algorithm for the generation of S-boxes with the maximum algebraic immunity and high nonlinearity. The algorithm is founded method of the permutation of output element of S-box. On basis of the proposed method, $S(8\times 8)$-box
Alijon Bozorbayevicha Sattarov +1 more
doaj +1 more source
A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks [PDF]
Information is a commodity. Information has economic value and production of it incurs cost. Securing the information is posing a considerable challenge.
Jothi, S. A. (S)
core
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Morpheus: stream cipher for software & hardware applications [PDF]
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core
Differential-Linear Cryptanalysis and Cube Attacks on ChiLow
ChiLow is a family of tweakable block ciphers specifically designed for embedded code encryption, proposed at EUROCRYPT 2025. Its novel nested tweakkey schedule and a variant of the χ function significantly enhance latency and energy efficiency.
Cheng Che, Tian Tian
doaj +1 more source
Revisiting the shuffle of generalized Feistel structure
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen +4 more
doaj +1 more source
The design of Xoodoo and Xoofff
This paper presents Xoodoo, a 48-byte cryptographic permutation with excellent propagation properties. Its design approach is inspired by Keccak-p, while it is dimensioned like Gimli for efficiency on low-end processors.
Joan Daemen +3 more
doaj +1 more source
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers
At CHES 2017, Banik et al. proposed a lightweight block cipher GIFT consisting of two versions GIFT-64 and GIFT-128. Recently, there are lots of authenticated encryption schemes that adopt GIFT-128 as their underlying primitive, such as GIFT-COFB and HyENA.
Shichang Wang +3 more
openaire +1 more source

