Results 21 to 30 of about 17,540 (147)
S-Box on Subgroup of Galois Field
In substitution−permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them.
Tariq Shah, Ayesha Qureshi
doaj +1 more source
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers [PDF]
Recently proposed algebraic attacks [2,6] and fast algebraic attacks [1,5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exponential in the degree of the equations. Fast algebraic attacks were introduced [5] as a way of reducing run-time complexity by reducing the degree of the system of equations ...
Philip Hawkes, Gregory G. Rose
openaire +1 more source
Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
For the practical application of code cryptosystems such as McEliece, it is necessary that the code used in the cryptosystem should have a fast decoding algorithm.
Vladimir Mikhailovich Deundyak +2 more
doaj +1 more source
Some results on fast algebraic attacks and higher-order non-linearities
In this study, the authors investigate the resistance of Boolean functions against fast algebraic attacks and deduce a bound between fast algebraic immunity and higher-order non-linearity (it is the first time that a bound between these two cryptographic criteria is given).
Q. Wang, T. Johansson, H. Kan
openaire +1 more source
Improving Fast Algebraic Attacks [PDF]
An algebraic attack is a method for cryptanalysis which is based on finding and solving a system of nonlinear equations. Recently, algebraic attacks where found helpful in cryptanalysing LFSR-based stream ciphers. The efficiency of these attacks greatly depends on the degree of the nonlinear equations.
openaire +2 more sources
Homomorphic encryption and some black box attacks
This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes ...
A Acar +10 more
core +1 more source
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov +14 more
core +3 more sources
A Smart Approach for GPT Cryptosystem Based on Rank Codes
The concept of Public- key cryptosystem was innovated by McEliece's cryptosystem. The public key cryptosystem based on rank codes was presented in 1991 by Gabidulin -Paramonov-Trejtakov(GPT).
Gabidulin, Ernst M. +2 more
core +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback [PDF]
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attacks, that can be seen as solving a system of multivariate linear equations, true with some probability.
openaire +1 more source

