Results 11 to 20 of about 16,934 (147)

Related-key impossible boomerang cryptanalysis on TWINE [PDF]

open access: yesTongxin xuebao, 2019
In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was ...
Min XIE, Feng TIAN, Jiaqi LI
doaj   +5 more sources

Determination of a class of permutation quadrinomials

open access: yesProceedings of the London Mathematical Society, Volume 127, Issue 2, Page 221-260, August 2023., 2023
Abstract We determine all permutation polynomials over Fq2$\mathbb {F}_{q^2}$ of the form XrA(Xq−1)$X^r A(X^{q-1})$ where, for some Q$Q$ that is a power of the characteristic of Fq$\mathbb {F}_q$, we have r≡Q+1(modq+1)$r\equiv Q+1\pmod {q+1}$ and all terms of A(X)$A(X)$ have degrees in {0,1,Q,Q+1}$\lbrace 0,1,Q,Q+1\rbrace$.
Zhiguo Ding, Michael E. Zieve
wiley   +1 more source

History and highlights of the teratological collection in the Narrenturm, Vienna (Austria)

open access: yesAmerican Journal of Medical Genetics Part A, Volume 191, Issue 5, Page 1301-1324, May 2023., 2023
Abstract The collection of the Narrenturm in Vienna houses and maintains more than 50,000 objects including approximately 1200 teratological specimens; making it one of the biggest collections of specimens from human origin in Europe. The existence of this magnificent collection―representing an important resource for dysmorphology research, mostly ...
Lucas L. Boer   +8 more
wiley   +1 more source

Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC

open access: yesIET Information Security, Volume 17, Issue 3, Page 407-422, May 2023., 2023
In this paper, we give the improvements of the related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC using the known distinguishers, and reduce the complexity of 13‐round related‐tweakey rectangle attack on Deoxys AE scheme Deoxys‐I‐256‐128. Abstract Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys ...
Jiamei Liu, Lin Tan, Hong Xu
wiley   +1 more source

Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search

open access: yesIET Information Security, Volume 17, Issue 3, Page 534-543, May 2023., 2023
We construct a DS‐MITM automatic search model for CRAFT and use the automatic search model to detect a 9‐round DS‐MITM distinguisher. Based on the 9‐round distinguisher, 19/20‐round DS‐MITM attacks can be presented. Abstract CRAFT is a lightweight block cipher designed by Beierle et al.
Zhangjun Ma, Manman Li, Shaozhen Chen
wiley   +1 more source

The Ghost and the Rock: Albert Renger‐Patzsch and the Shape of Time

open access: yesArt History, Volume 46, Issue 1, Page 124-153, February 2023., 2023
The career of photographer Albert Renger‐Patzsch began in the early 1920s in the storerooms of Germany's ethnographic museums, and ended in 1966 with the publication of his last photobook, Gestein (Rock). His reputation as a leading exponent of Neue Sachlichkeit (New Objectivity) developed in tandem with heated debates over sculptural facsimiles and ...
Megan R. Luke
wiley   +1 more source

SAT‐Based Security Evaluation for WARP against Linear Cryptanalysis

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128‐bit block and a 128‐bit key. It adopts a 32‐nibble type‐II generalized Feistel network (GFN) structure, incorporating a nibble permutation optimized for both security and efficiency.
Jiali Shi   +3 more
wiley   +1 more source

Similarity Property and Slide Attack of Block Cipher FESH

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award‐winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the ...
Yafei Zheng, Wenling Wu, Taimur Bakhshi
wiley   +1 more source

Improved linear cryptanalysis on 25‐round SMS4

open access: yesIET Communications, Volume 16, Issue 14, Page 1643-1653, August 2022., 2022
Abstract SMS4 is the Chinese national standard for WLAN, which is also an ISO/IEC international standard. This paper presents a linear cryptanalysis on 25‐round SMS4 for the first time. Firstly, this paper adopts a new statistic in linear cryptanalysis, which is aimed to compute the distance between one cipher system and one random permutation, which ...
Lishi Fu, Chenhui Jin
wiley   +1 more source

Rectangle Attack Against Type‐I Generalized Feistel Structures

open access: yesChinese Journal of Electronics, Volume 31, Issue 4, Page 713-720, July 2022., 2022
Type‐I generalized Feistel networks (GFN) are widely used frameworks in symmetric‐key primitive designs such as CAST‐256 and Lesamnta. Different from the extensive studies focusing on specific block cipher instances, the analysis against Type‐I GFN structures gives generic security evaluation of the basic frameworks and concentrates more on the effect ...
Yi ZHANG   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy