Results 111 to 120 of about 2,248,235 (257)
Subspace Trail Cryptanalysis and its Applications to AES
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi +2 more
doaj +1 more source
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source
Differential cryptanalysis of image cipher using block-based scrambling and image filtering [PDF]
Feng Yu +3 more
openalex +1 more source
Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance [PDF]
Vincenzo Agate +5 more
openalex +1 more source
Algebraic properties of generalized Rijndael-like ciphers [PDF]
We provide conditions under which the set of Rijndael functions considered as permutations of the state space and based on operations of the finite field $\GF (p^k)$ ($p\geq 2$ a prime number) is not closed under functional composition.
B. Scott +5 more
core
Extended SAC: A review and new algorithms of differential cryptanalysis of 4-bit s-boxes and strict avalanche criterion of BFs and 4-bit s-boxes again with a new extension to HO-SAC criterion [PDF]
Sankhanil Dey, Ranjan Ghosh
openalex +1 more source
ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core
Security against differential and linear cryptanalysis for general SPT models
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU +4 more
doaj +2 more sources
Algorithms for differential cryptanalysis
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the reasoning done by cryptanalysts, a symmetric primitive is secured when no practical attack have been found against it. A large part of the security demonstration of a primitive consists in trying every classical attack against the studied primitives.
openaire +1 more source

