Results 51 to 60 of about 38,531 (142)

Decorrelation: A Theory for Block Cipher Security [PDF]

open access: yes, 2018
Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff ...
Vaudenay, Serge
core  

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise

open access: yes, 2012
This paper considers the problem of end-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in application layer over which Wyner-type secrecy encoding is invoked to ...
Khiabani, Yahya S.   +3 more
core   +1 more source

Advanced truncated differential cryptanalysis of GOST block cipher [PDF]

open access: yes, 2014
n this paper, we use the ideas presented by Courtois and Mourouzis to study the security of two variants of GOST, which are considered as the simpler and most secure variants [9]; the one with the S-boxes replaced by the Identity Map and the ISO version ...
Courtois, N.   +2 more
core  

Differential Cryptanalysis of Feistel’s Iterated Block Ciphers [PDF]

open access: yes, 2000
В статті обговорюються базові принципи Диференційного криптоаналіза, концепції, алгоритми, ідеї і методи, які забезпечують цей тип атаки, а також математичне обгрунтування.Here are described the basic principles of Differential Cryptanalysis, concepts ...
Limar, Sergey, Telizhenko, Alexander
core  

Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes

open access: yes, 2016
We give polynomial time attacks on the McEliece public key cryptosystem based either on algebraic geometry (AG) codes or on small codimensional subcodes of AG codes.
Couvreur, Alain   +2 more
core   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. [PDF]

open access: yesEntropy (Basel), 2023
Kim H   +6 more
europepmc   +1 more source

On the resistance of new lightweight block ciphers against differential cryptanalysis. [PDF]

open access: yesHeliyon, 2023
Chan YY   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy