Results 101 to 110 of about 2,411 (231)

Impossible Differential Cryptanalysis of Lightweight Block Cipher WARP [PDF]

open access: green, 2023
Hong Xu   +3 more
openalex   +1 more source

DIFFERENTIAL CRYPTANALYSIS OF THE MARS BLOCKCIPHER

open access: yesPrikladnaya diskretnaya matematika, 2009
Summary: In this work we present a differential attack on MARS which breaks 8 core and 8 mixing rounds with pre- and post-whitening. This attack is based on a new 8-core round differential characteristic with probability \(2^{-98}\) and allows to recover more subkeys bits than previously published attacks (752 instead of 682) faster than exhaustive key
openaire   +2 more sources

Computing the Differential Probability of a Word-Based Block Cipher

open access: yesCryptography
Differential cryptanalysis is one of the fundamental cryptanalysis techniques to evaluate the security of the block cipher. In many cases, resistance to differential cryptanalysis is proven through the upper bound of the differential characteristic ...
Dawoon Kwon, Junghwan Song
doaj   +1 more source

Quantum Automated Tools for Finding Impossible Differentials

open access: yesMathematics
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie   +4 more
doaj   +1 more source

On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis

open access: diamond, 2020
Dhiman Saha   +5 more
openalex   +2 more sources

DIFFERENTIAL AND LINEAR CRYPTOANALYSIS METHODS ELEMENTS FOR ENCRYPTION ALGORITHM BASED ON DYNAMIC CHAOS

open access: yesСистемный анализ и прикладная информатика, 2015
In this paper we assessed the sustainability of the encryption algorithm based on dynamic chaos, as well as the basic principles for the implementation of linear and differential cryptanalysis.
A. V. Sidorenko, L. A. Zhukovets
doaj  

Cryptanalysis of LowMC instances using single plaintext/ciphertext pair

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Arguably one of the main applications of the LowMC family ciphers is in the post-quantum signature scheme PICNIC. Although LowMC family ciphers have been studied from a cryptanalytic point of view before, none of these studies were directly concerned ...
Subhadeep Banik   +3 more
doaj  

Home - About - Disclaimer - Privacy