Results 21 to 30 of about 2,248,235 (257)

Differential-linear cryptanalysis of PRINCE cipher

open access: yes网络与信息安全学报, 2021
PRINCE is a low-latency lightweight block cipher, which is widely used in a lot of resource constrained devices. It is based on the FX construction and the core component is PRINCEcore.
LIU Zhengbin
doaj   +3 more sources

Quantum differential cryptanalysis [PDF]

open access: yesQuantum Information Processing, 2015
9 pages, 3 ...
Zhou, Qing   +3 more
openaire   +4 more sources

Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES

open access: greenIACR Transactions on Symmetric Cryptology, 2018
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” property - has been presented. Although it allows to distinguish a random permutation from an AES-like one, it seems rather hard to implement a key ...
Lorenzo Grassi
openalex   +3 more sources

Differential Cryptanalysis of Lucifer [PDF]

open access: yesJournal of Cryptology, 1996
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ben-Aroya, Ishai, Biham, Eli
openaire   +2 more sources

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

Rotational Differential-Linear Cryptanalysis Revisited

open access: yesJournal of Cryptology, 2022
AbstractThe differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with ...
Liu, Yunwen   +4 more
openaire   +2 more sources

Security Analysis of Lightweight IoT Cipher: Chaskey

open access: yesCryptography, 2020
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree search based heuristic approach. ARX algorithms are suitable for resource-constrained devices such as IoT and very resistant to standard cryptanalysis such as ...
Ashutosh Dhar Dwivedi
doaj   +1 more source

Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON

open access: yesKSII Transactions on Internet and Information Systems, 2021
SIMON and SPECK are two families of lightweight block ciphers that have excellent performance on hardware and software platforms. At CRYPTO 2019, Gohr first introduces the differential cryptanalysis based deep learning on round-reduced SPECK32/64, and ...
Wenqiang Tian, Bin Hu
semanticscholar   +1 more source

Full-round impossible differential attack on shadow block cipher

open access: yesCybersecurity, 2023
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy