Results 101 to 110 of about 9,083 (227)

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

Subspace Trail Cryptanalysis and its Applications to AES

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi   +2 more
doaj   +1 more source

Highly dispersive substitution box (S‐box) design using chaos

open access: yesETRI Journal, 2020
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is ...
Zaid Bin Faheem   +4 more
doaj   +1 more source

Algebraic properties of generalized Rijndael-like ciphers [PDF]

open access: yes, 2012
We provide conditions under which the set of Rijndael functions considered as permutations of the state space and based on operations of the finite field $\GF (p^k)$ ($p\geq 2$ a prime number) is not closed under functional composition.
B. Scott   +5 more
core  

Truncated differential cryptanalysis of PRINCE

open access: yesSecurity and Communication Networks, 2015
AbstractPRINCE is a lightweight block cipher whose block size and key size are 64‐bit and 128‐bit, respectively. The core component of PRINCE is PRINCE which is wrapped by the initial and final key whitening. PRINCEcore adopts a 12‐round SPN structure.
Chao Li   +3 more
openaire   +2 more sources

Analysing Relations involving small number of Monomials in AES S- Box [PDF]

open access: yes, 2017
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core   +1 more source

Security of E2 against Truncated Differential Cryptanalysis [PDF]

open access: bronze, 2000
Shiho Moriai   +3 more
openalex   +1 more source

Security against differential and linear cryptanalysis for general SPT models

open access: yesTongxin xuebao, 2012
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy