Results 21 to 30 of about 406,684 (268)

A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [PDF]

open access: yes, 2009
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named "Multimedia Cryptography System" (MCS). No cryptanalytic results have been reported so far. This paper presents a differential attack to break MCS, which
Kyamakya, Kyandoghere   +3 more
core   +1 more source

Provable Security Against a Differential Attack

open access: yesDAIMI Report Series, 1994
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably resistant against differential attacks. The main result on the security of a DES-like cipher with independent round keys is Theorem 1, which gives an upper bound to the probability of <em>s</em>-round differentials, as defined in <em> ...
Nyberg, Kaisa, Knudsen, Lars Ramkilde
openaire   +2 more sources

Chosen Plaintext Combined Attack against SM4 Algorithm

open access: yesApplied Sciences, 2022
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key.
Jintao Rao, Zhe Cui
doaj   +1 more source

Internal collision attack on Maraca [PDF]

open access: yes, 2009
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic ...
Canteaut, Anne, Naya-Plasencia, Maria
core   +1 more source

Differential Fault Attack on LEA [PDF]

open access: yes, 2015
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms.
Jap, Dirmanto, Breier, Jakub
openaire   +2 more sources

Stability analysis of supply chain in evolutionary game based on stability theory of nonlinear differential equation

open access: yesAlexandria Engineering Journal, 2020
Based on the stability theory of nonlinear differential equation, this paper analyzes the stability of the evolutionary game supply chain, and obtains the strategies that both sides should adopt in different situations.
Huiqun Yuan   +3 more
doaj   +1 more source

Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In ToSC 2021(2), Sun et al. implemented an automatic search with the Boolean satisfiability problem (SAT) method on GIFT-128 and identified a 19-round linear approximation with the expected linear potential being 2−117.43, which is utilised to launch a ...
Ling Sun, Wei Wang, Meiqin Wang
doaj   +1 more source

Doubly Perfect Nonlinear Boolean Permutations

open access: yes, 2010
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind ...
Biham E.   +10 more
core   +3 more sources

Differential Forgery Attack Against LAC [PDF]

open access: yes, 2016
LAC is one of the candidates to the CAESAR competition. In this note we present a differential forgery attack on LAC. We show that some differentials have a probability higher than 2^-64, using a collection of characteristics in order to evaluate a lower bound on the probability of a differential. This allows a forgery attack on the full LAC. This work
openaire   +3 more sources

Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence [PDF]

open access: yes, 2007
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only ...
Chen   +13 more
core   +3 more sources

Home - About - Disclaimer - Privacy