Results 211 to 220 of about 106,304 (243)
Some of the next articles are maybe not open access.

New Impossible Differential Attacks on AES

2008
In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to better impossible differential attacks on 7-round AES-128 and ...
Lu, J.   +3 more
openaire   +2 more sources

Impossible differential cryptanalysis of Advanced Encryption Standard

Science in China Series F: Information Sciences, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Jie, Hu, Yupu, Zhang, Yueyu
openaire   +2 more sources

Impossible Differentials of SPN Ciphers

2017
An upper bound of the length of impossible differentials for an SPN structure was presented at EUROCRYPT 2016. This paper mainly focuses on the lengths of impossible differentials for two specific SPN structures. The details of the S-boxes could be exploited to construct longer impossible differentials for ciphers adopting these structures.
Xuan Shen   +3 more
openaire   +1 more source

Improved Impossible Differentials on Twofish

2000
Twofish is one of the finalists for the Advanced Encryption Standard selection process (AES). The best up-to-date analysis of Twofish was presented by one of its designers, who showed that its complexity on 6-round Twofish with 128-bit keys is 4.6ċ2128 one-round computations.
Biham Eli, Furman Vladimir
openaire   +1 more source

Improved Impossible Differential Cryptanalysis of ARIA

2008 International Conference on Information Security and Assurance (isa 2008), 2008
Impossible differential cryptanalysis is a method recovering secret key by getting rid of the keys that satisfy impossible differential relations. This cryptanalysis has been used to attack AES and many good results were gotten. For the new block cipher ARIA is similar to AES in structure, it is necessary to research its security against impossible ...
Shenhua Li, Chunyan Song
openaire   +1 more source

Impossible Differential-Algebraic Cryptanalysis of Serpent

2009 International Conference on Multimedia Information Networking and Security, 2009
Serpent is an SP Network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of Serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher.
Zhihua Hu, Zhongping Qin, Haiqing Han
openaire   +1 more source

Impossible Differential Cryptanalysis of SPECK

2019
The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and
Mingming Li   +3 more
openaire   +1 more source

Impossible differential cryptanalysis on cipher E2

Concurrency and Computation: Practice and Experience, 2013
SUMMARYE2, a block cipher, is an Advanced Encryption Standard candidate designed and submitted by Nippon Telegraph and Telephone Corporation. It employs a Feistel structure as global structure and two‐layer substitution–permutation network structure in round function.
Yuechuan Wei, Xiaoyuan Yang, Chao Li
openaire   +1 more source

Impossible Differential Cryptanalysis of SNAKE-2

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
9-round impossible differentials of SNAKE-2 are found due to the simple linear transformation in its round function, and 10 to 12-round SNAKE-2 are attacked by using these impossible differentials .
Bing Sun, Longjiang Qu, Chao Li
openaire   +1 more source

Impossible differential attack on Simpira v2

Science China Information Sciences, 2017
Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016, and can be used to construct high throughput block ciphers by using the Even-Mansour construction, permutation-based hashing, and wide-block authenticated encryption. This paper shows a 9-round impossible differential of Simpira-4. To the best of our knowledge, this is the
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire   +1 more source

Home - About - Disclaimer - Privacy