Results 221 to 230 of about 106,304 (243)
Some of the next articles are maybe not open access.
IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES
Cryptologia, 2003Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.
openaire +2 more sources
New Impossible Differential Attacks on Camellia
2012Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 FL/FL−1 layers, which turn out to be the first 7-round impossible differentials with 2 FL/FL−1 layers.
Dongxia Bai, Leibo Li
openaire +1 more source
Impossible Differential Attacks on 13-Round CLEFIA-128
Journal of Computer Science and Technology, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mala, Hamid +2 more
openaire +1 more source
Improved Impossible Differential Cryptanalysis of SMS4
2012 Eighth International Conference on Computational Intelligence and Security, 2012The SMS4 is the first commercial block cipher published by Chinese government. It's a 32-round block cipher encrypted by 128-bit keys. By analyzing the changes of the difference between input and output pairs in each round, this paper presents a new impossible differential path of the 14- round SMS4.
Tao Shi, Wei Wang, Qiuliang Xu
openaire +1 more source
Note on Impossible Differential Attacks
2016While impossible differential cryptanalysis is a well-known and popular cryptanalytic method, errors in the analysis are often discovered and many papers in the literature present flaws. Wishing to solve that, Boura et al.i¾?[1] presented at ASIACRYPT'14 a generic vision of impossible differential attacks with the aim of simplifying and helping the ...
openaire +1 more source
Improved Impossible Differential Cryptanalysis on SMS4
2010 International Conference on Communications and Intelligence Information Security, 2010This paper presents an improved impossible differential attack on the block cipher SMS4 which is used in WAPI (the Chinese WLAN national standard). Combining with some new observations, this paper can filter out the wrong keys more efficiently, and present an impossible differential attack on 17-round SMS4, which updates the best known impossible ...
openaire +1 more source
Impossible Differential Cryptanalysis on Tweaked E2
2012E2, a 128-bit block cipher, is an AES candidate designed and submitted by NTT corporation. It employs a Feistel structure as global structure and 2-layer Substitution-Permutation Network structure in round function. The conservative structure makes E2 immune to kinds of current cryptanalysis.
Yuechuan Wei +3 more
openaire +1 more source
Impossible Differential Analysis on 8-Round PRINCE
2020PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a 4-round impossible differential based on some observations on M′ operation and launched impossible differential attacks on 6- and 7 ...
Yaoling Ding +3 more
openaire +1 more source
Impossible Differential Cryptanalysis for Block Cipher Structures
2003Impossible Differential Cryptanalysis(IDC) [4] uses impossible differential characteristics to retrieve a subkey material for the first or the last several rounds of block ciphers. Thus, the security of a block cipher against IDC can be evaluated by impossible differential characteristics. In this paper, we study impossible differential characteristics
Jongsung Kim +5 more
openaire +1 more source
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
2017SKINNY is a new lightweight tweakable block cipher family proposed by Beierle et al. at CRYPTO 2016. SKINNY has 6 main variants where SKINNY-n-t is a block cipher that operates on n-bit blocks using t-bit tweakey (key and tweak) where \(n=64\) or 128 and \(t=n\), 2n, or 3n. In this paper, we present impossible differential attacks against reduced-round
Mohamed Tolba +2 more
openaire +1 more source

