Results 11 to 20 of about 16,934 (147)
Related-key impossible boomerang cryptanalysis on TWINE [PDF]
In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was ...
Min XIE, Feng TIAN, Jiaqi LI
doaj +5 more sources
Determination of a class of permutation quadrinomials
Abstract We determine all permutation polynomials over Fq2$\mathbb {F}_{q^2}$ of the form XrA(Xq−1)$X^r A(X^{q-1})$ where, for some Q$Q$ that is a power of the characteristic of Fq$\mathbb {F}_q$, we have r≡Q+1(modq+1)$r\equiv Q+1\pmod {q+1}$ and all terms of A(X)$A(X)$ have degrees in {0,1,Q,Q+1}$\lbrace 0,1,Q,Q+1\rbrace$.
Zhiguo Ding, Michael E. Zieve
wiley +1 more source
History and highlights of the teratological collection in the Narrenturm, Vienna (Austria)
Abstract The collection of the Narrenturm in Vienna houses and maintains more than 50,000 objects including approximately 1200 teratological specimens; making it one of the biggest collections of specimens from human origin in Europe. The existence of this magnificent collection―representing an important resource for dysmorphology research, mostly ...
Lucas L. Boer +8 more
wiley +1 more source
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC
In this paper, we give the improvements of the related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC using the known distinguishers, and reduce the complexity of 13‐round related‐tweakey rectangle attack on Deoxys AE scheme Deoxys‐I‐256‐128. Abstract Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys ...
Jiamei Liu, Lin Tan, Hong Xu
wiley +1 more source
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
We construct a DS‐MITM automatic search model for CRAFT and use the automatic search model to detect a 9‐round DS‐MITM distinguisher. Based on the 9‐round distinguisher, 19/20‐round DS‐MITM attacks can be presented. Abstract CRAFT is a lightweight block cipher designed by Beierle et al.
Zhangjun Ma, Manman Li, Shaozhen Chen
wiley +1 more source
The Ghost and the Rock: Albert Renger‐Patzsch and the Shape of Time
The career of photographer Albert Renger‐Patzsch began in the early 1920s in the storerooms of Germany's ethnographic museums, and ended in 1966 with the publication of his last photobook, Gestein (Rock). His reputation as a leading exponent of Neue Sachlichkeit (New Objectivity) developed in tandem with heated debates over sculptural facsimiles and ...
Megan R. Luke
wiley +1 more source
SAT‐Based Security Evaluation for WARP against Linear Cryptanalysis
WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128‐bit block and a 128‐bit key. It adopts a 32‐nibble type‐II generalized Feistel network (GFN) structure, incorporating a nibble permutation optimized for both security and efficiency.
Jiali Shi +3 more
wiley +1 more source
Similarity Property and Slide Attack of Block Cipher FESH
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award‐winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the ...
Yafei Zheng, Wenling Wu, Taimur Bakhshi
wiley +1 more source
Improved linear cryptanalysis on 25‐round SMS4
Abstract SMS4 is the Chinese national standard for WLAN, which is also an ISO/IEC international standard. This paper presents a linear cryptanalysis on 25‐round SMS4 for the first time. Firstly, this paper adopts a new statistic in linear cryptanalysis, which is aimed to compute the distance between one cipher system and one random permutation, which ...
Lishi Fu, Chenhui Jin
wiley +1 more source
Rectangle Attack Against Type‐I Generalized Feistel Structures
Type‐I generalized Feistel networks (GFN) are widely used frameworks in symmetric‐key primitive designs such as CAST‐256 and Lesamnta. Different from the extensive studies focusing on specific block cipher instances, the analysis against Type‐I GFN structures gives generic security evaluation of the basic frameworks and concentrates more on the effect ...
Yi ZHANG +3 more
wiley +1 more source

