Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis [PDF]
Makoto Sugita +2 more
openalex +1 more source
XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis
The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.
Marina Aleksandrovna Pudovkina +1 more
doaj
Revisiting the shuffle of generalized Feistel structure
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen +4 more
doaj +1 more source
EVALUATION OF CRYPTOGRAPHIC ALGORITHMS [PDF]
This article represents a synthesis of the evaluation methods for cryptographic algorithms and of their efficiency within practical applications. It approaches also the main operations carried out in cryptanalysis and the main categories and methods of ...
Emil Simion, Mircea Andraşiu
core
Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks [PDF]
Ju-Sung Kang +5 more
openalex +1 more source
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis [PDF]
Sangwoo Park +4 more
openalex +1 more source
ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core
Differential and Linear Cryptanalysis of a Reduced-Round SC2000 [PDF]
Hitoshi Yanami +2 more
openalex +1 more source
Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON [PDF]
Wenqiang Tian, Bin Hu
openalex +1 more source
Blind Differential Cryptanalysis for Enhanced Power Attacks [PDF]
Helena Handschuh, Bart Preneel
openalex +1 more source

