Results 21 to 30 of about 2,411 (231)

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: goldIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +2 more sources

Improving Differential-Neural Cryptanalysis

open access: yesIACR Communications in Cryptology
Our first objective is to enhance the capabilities of differential-neural distinguishers by applying more deep-learning techniques, focusing on handling more rounds and improving accuracy. Inspired by the Inception Block in GoogLeNet, we adopted a design that uses multiple parallel convolutional layers with varying kernel sizes before the residual
Liu Zhang, Zilong Wang, Baocang Wang
openaire   +2 more sources

Differential-Linear Cryptanalysis of Reduced Round ChaCha

open access: diamondIACR Transactions on Symmetric Cryptology
ChaCha is a well-known stream cipher that has been used in many network protocols and software. In this paper, we study the security of reduced round ChaCha.
Zhichao Xu   +3 more
openalex   +3 more sources

Differential-linear cryptanalysis of PRINCE cipher

open access: yes网络与信息安全学报, 2021
PRINCE is a low-latency lightweight block cipher, which is widely used in a lot of resource constrained devices. It is based on the FX construction and the core component is PRINCEcore.
LIU Zhengbin
doaj   +3 more sources

Quantum differential cryptanalysis [PDF]

open access: yesQuantum Information Processing, 2015
9 pages, 3 ...
Zhou, Qing   +3 more
openaire   +4 more sources

Differential Cryptanalysis of Lucifer [PDF]

open access: yesJournal of Cryptology, 1996
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ben-Aroya, Ishai, Biham, Eli
openaire   +2 more sources

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

Rotational Differential-Linear Cryptanalysis Revisited

open access: yesJournal of Cryptology, 2022
AbstractThe differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with ...
Liu, Yunwen   +4 more
openaire   +2 more sources

Security Analysis of Lightweight IoT Cipher: Chaskey

open access: yesCryptography, 2020
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree search based heuristic approach. ARX algorithms are suitable for resource-constrained devices such as IoT and very resistant to standard cryptanalysis such as ...
Ashutosh Dhar Dwivedi
doaj   +1 more source

Home - About - Disclaimer - Privacy