Results 11 to 20 of about 723,432 (288)

Impossible differential cryptanalysis using matrix method

open access: yesDiscrete Mathematics, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kim, Jongsung   +2 more
openaire   +3 more sources

MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC

open access: yesIEEE Access, 2019
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj   +3 more sources

Accurate Estimate of the Advantage of Impossible Differential Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Impossible differential attacks, which are taking advantage of differentials that cannot occur, are powerful attacks for block cipher primitives. The power of such attacks is often measured in terms of the advantage — number of key-bits found during the ...
Céline Blondeau
doaj   +1 more source

Private Matchings and Allocations [PDF]

open access: yes, 2016
We consider a private variant of the classical allocation problem: given k goods and n agents with individual, private valuation functions over bundles of goods, how can we partition the goods amongst the agents to maximize social welfare?
Hsu, Justin   +4 more
core   +2 more sources

Impossible Differential Cryptanalysis of Surge

open access: yesIOP Conference Series: Earth and Environmental Science, 2020
Abstract In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively. They also proved that the cipher has good performance on security and effectively resists on differential attack, linear attack and algebraic attack.
Zhiqiang Qu, Xuan Shen, Jun He
openaire   +1 more source

Multiple Impossible Differential Attacks for ForkAES

open access: yesSecurity and Communication Networks, 2022
To yield a highly efficient authentication encryption design for very short messages, the tweakable forkcipher is proposed, which is a tweakable block cipher that uses forking construction to produce two output blocks. The designers also presented ForkAES, a forkcipher that is based on the round function of AES and the tweakable variant of KIASU ...
Zilong Jiang, Chenhui Jin
openaire   +1 more source

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: yesIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +1 more source

Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba   +4 more
doaj   +1 more source

Polytopic Cryptanalysis [PDF]

open access: yes, 2016
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov   +25 more
core   +3 more sources

Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Generalized Feistel structures (called GFSs for short) are one of the most popular block cipher structures. They are mainly divided into type‐1, type‐2 and type‐3 GFS.
Xuan Shen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy