Results 41 to 50 of about 9,083 (227)
Algebraic Precomputations in Differential Cryptanalysis
Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes. Algebraic techniques have been successfully applied against a number of multivariate schemes and stream ciphers. Yet, their feasibility against block ciphers remains the source of much speculation.
Albrecht, Martin +4 more
openaire +15 more sources
Related-Key Differential Attacks on COSB-128
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept.
Song Dat Phuc Tran, Changhoon Lee
doaj +1 more source
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai +3 more
doaj +1 more source
Machine learning-aided differential-linear attacks with applications to Des and Speck32/64
In CRYPTO 2019, Gohr introduced machine learning-aided differential cryptanalysis, demonstrating superior performance in key-recovery attacks compared to traditional methods. This advancement has sparked significant interest in exploring the potential of
Ze-zhou Hou +2 more
doaj +1 more source
System approach to disparity estimation [PDF]
A system approach to disparity estimation using dynamic programming is presented. The four step system can calculate a dense correspondence map between a stereo pair with parallel or nonparallel camera geometry.
Cosmas, J, Panis, S, Ziegler, M
core +1 more source
Security evaluation, NPCR + UACI results of 99.5978% and 33.4549% respectively, confirm the system is secure against statistical and differential attacks. Besides, the FPGA implementation achieves low power of 115 mW at a speed of 42.56 MHz. This makes it suitable for IoT applications where power and hardware resources are constrained. ABSTRACT In this
Fritz Nguemo Kemdoum +4 more
wiley +1 more source
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps
Recently, a chaotic cryptographic scheme based on composition maps was proposed. This paper studies the security of the scheme and reports the following findings: 1) the scheme can be broken by a differential attack with $6+\lceil\log_L(MN)\rceil$ chosen-
Akhavan A. +6 more
core +1 more source
Linear and Differential Cryptanalysis of SHA-256 [PDF]
The one-way hash function plays an important role in digital signatures and message authentication from the viewpoint of security. No effective attacking method has been discovered to the algorithm of hash function standard.
Ishikawa, Hirofumi, Wang, Xiao Dong
core +1 more source
ABSTRACT Background and Aims Despite their widespread use, randomized clinical trials (RCTs) face challenges like differential loss to follow‐up, which can impact validity. Real‐world evidence (RWE) from real‐world data (RWD) is increasingly used to address these limitations, but RCTs and RWE have provided complementary, disconnected observations of ...
Michael Batech +7 more
wiley +1 more source
Commutative Cryptanalysis Made Practical
About 20 years ago, Wagner showed that most of the (then) known techniques used in the cryptanalysis of block ciphers were particular cases of what he called commutative diagram cryptanalysis.
Jules Baudrin +5 more
doaj +1 more source

