Results 241 to 250 of about 723,432 (288)
Some of the next articles are maybe not open access.

Improved Impossible Differentials on Twofish

2000
Twofish is one of the finalists for the Advanced Encryption Standard selection process (AES). The best up-to-date analysis of Twofish was presented by one of its designers, who showed that its complexity on 6-round Twofish with 128-bit keys is 4.6ċ2128 one-round computations.
Biham Eli, Furman Vladimir
openaire   +1 more source

Improved Impossible Differential Cryptanalysis of ARIA

2008 International Conference on Information Security and Assurance (isa 2008), 2008
Impossible differential cryptanalysis is a method recovering secret key by getting rid of the keys that satisfy impossible differential relations. This cryptanalysis has been used to attack AES and many good results were gotten. For the new block cipher ARIA is similar to AES in structure, it is necessary to research its security against impossible ...
Shenhua Li, Chunyan Song
openaire   +1 more source

Impossible Differential-Algebraic Cryptanalysis of Serpent

2009 International Conference on Multimedia Information Networking and Security, 2009
Serpent is an SP Network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of Serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher.
Zhihua Hu, Zhongping Qin, Haiqing Han
openaire   +1 more source

Impossible Differential Cryptanalysis of SPECK

2019
The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and
Mingming Li   +3 more
openaire   +1 more source

Impossible differential cryptanalysis on cipher E2

Concurrency and Computation: Practice and Experience, 2013
SUMMARYE2, a block cipher, is an Advanced Encryption Standard candidate designed and submitted by Nippon Telegraph and Telephone Corporation. It employs a Feistel structure as global structure and two‐layer substitution–permutation network structure in round function.
Yuechuan Wei, Xiaoyuan Yang, Chao Li
openaire   +1 more source

Impossible Differential Cryptanalysis of SNAKE-2

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
9-round impossible differentials of SNAKE-2 are found due to the simple linear transformation in its round function, and 10 to 12-round SNAKE-2 are attacked by using these impossible differentials .
Bing Sun, Longjiang Qu, Chao Li
openaire   +1 more source

Impossible differential attack on Simpira v2

Science China Information Sciences, 2017
Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016, and can be used to construct high throughput block ciphers by using the Even-Mansour construction, permutation-based hashing, and wide-block authenticated encryption. This paper shows a 9-round impossible differential of Simpira-4. To the best of our knowledge, this is the
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire   +1 more source

IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES

Cryptologia, 2003
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.
openaire   +2 more sources

New Impossible Differential Attacks on Camellia

2012
Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 FL/FL−1 layers, which turn out to be the first 7-round impossible differentials with 2 FL/FL−1 layers.
Dongxia Bai, Leibo Li
openaire   +1 more source

Impossible Differential Attacks on 13-Round CLEFIA-128

Journal of Computer Science and Technology, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mala, Hamid   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy