Results 1 to 10 of about 415 (97)

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu   +3 more
doaj   +3 more sources

Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks

open access: yesIEEE Access, 2022
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) for $\sigma $ -LFSRs. $\sigma $ -LFSRs with such configurations can be applied to any stream cipher that uses a word-based LFSR.
Subrata Nandi   +3 more
doaj   +1 more source

Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions [PDF]

open access: yesIEEE Transactions on Information Theory, 2011
13 pages, submitted to IEEE Transactions on Information ...
Meicheng Liu, Dongdai Lin, Dingyi Pei
openaire   +2 more sources

A Bound of Fast Algebraic Immunity of Constructions With BPR Using a Four-Disjoint-Part Support

open access: yesIEEE Access, 2020
Boolean functions are used for stream cipher ought to be a high fast algebraic immunity (FAI) to effectively against fast algebraic attacks. In the previous research methods, there is no suitable method to gain the FAI of Boolean functions using ...
Kai Xu, Ying Zhang, Jing Wang
doaj   +1 more source

Generating highly nonlinear resilient Boolean functions resistance against algebraic and fast algebraic attacks [PDF]

open access: yesSecurity and Communication Networks, 2014
ABSTRACTBoolean functions play an important role in the design of stream ciphers. In this paper, a simulated annealing algorithm is designed to obtain Boolean functions satisfying all the needed criteria: high nonlinearity, 1‐resiliency, optimal algebraic degree, optimal (or suboptimal) algebraic immunity, and good immunity to fast algebraic attacks ...
Jun‐Po Yang, Wei‐Guo Zhang
openaire   +1 more source

Improved Twofish Algorithm: A Digital Image Enciphering Application

open access: yesIEEE Access, 2021
With the growth of networks, the Internet of Things (IoT) and new cyber attacks pose threats to privacy and security, secure communication is therefore becoming one of the most crucial concerns.
Tanveer ul Haq   +5 more
doaj   +1 more source

Hybrid tabu search algorithm for excellent Boolean function

open access: yesTongxin xuebao, 2022
Boolean function in symmetric cryptographic algorithm must satisfy excellent cryptographic criteria to ensure the security of the algorithm.By combining the advantages of tabu search algorithm and hill climbing algorithm, a new heuristic generation ...
Weiqiong WANG   +3 more
doaj   +2 more sources

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks [PDF]

open access: yes, 2006
In this paper we propose several efficient algorithms for assessing the resistance of Boolean functions against algebraic and fast algebraic attacks when implemented in LFSR-based stream ciphers. An algorithm is described which permits to compute the algebraic immunity d of a Boolean function with n variables in $\mathcal{O}(D^2)$ operations, for $D ...
Armknecht, Frederik   +5 more
openaire   +3 more sources

A Lower Bound of Fast Algebraic Immunity of a Class of 1-Resilient Boolean Functions

open access: yesIEEE Access, 2019
Boolean functions should possess high fast algebraic immunity when used in stream ciphers in order to stand up to fast algebraic attacks. However, in previous research, the fast algebraic immunity of Boolean functions was usually calculated by the ...
Yindong Chen   +3 more
doaj   +1 more source

Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ Variables Majority Function

open access: yesIEEE Access, 2019
Boolean functions should possess high fast algebraic immunity (FAI) when it is used in stream ciphers in order to stand up to fast algebraic attacks. However, in previous research, the FAI of Boolean functions was usually calculated by computer.
Yindong Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy