Results 31 to 40 of about 406,684 (268)
Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong +5 more
doaj +1 more source
Related-key Differential Analysis of Khudra Algorithm [PDF]
Khudra algorithm is a kind of lightweight block cipher algorithm which has 18 rounds.The existing analysis method,which uses the impossibility relevant key difference to analysis Khudra algorithm,constructs a 14 rounds distinguisher to attack the 16 ...
REN Yaoyao,ZHANG Wenying,XING Chaohui
doaj +1 more source
Breaking an image encryption algorithm based on chaos
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen ...
Arroyo D. +4 more
core +1 more source
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations [PDF]
Recently two encryption schemes were proposed by combining circular bit shift and XOR operations, under the control of a pseudorandom bit sequence (PRBS) generated from a chaotic system. This paper studies the security of these two encryption schemes and
Alvarez +24 more
core +3 more sources
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128
When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cryptanalysis and the linear trails in the linear cryptanalysis.
Rui Zong +5 more
doaj +1 more source
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware +13 more
wiley +1 more source
Novel extended multivariate public key cryptosystem
To resist linearization attack and differential attack effectively, a nonlinear invertible transformation based on“tame transformation” was constructed.
Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN
doaj +2 more sources
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin +4 more
doaj +1 more source
The (related-key) impossible boomerang attack and its application to the AES block cipher [PDF]
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005.
Jiqiang Lu
core +1 more source
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda +15 more
wiley +1 more source

