Results 251 to 260 of about 723,432 (288)
Some of the next articles are maybe not open access.

Improved Impossible Differential Cryptanalysis of SMS4

2012 Eighth International Conference on Computational Intelligence and Security, 2012
The SMS4 is the first commercial block cipher published by Chinese government. It's a 32-round block cipher encrypted by 128-bit keys. By analyzing the changes of the difference between input and output pairs in each round, this paper presents a new impossible differential path of the 14- round SMS4.
Tao Shi, Wei Wang, Qiuliang Xu
openaire   +1 more source

Note on Impossible Differential Attacks

2016
While impossible differential cryptanalysis is a well-known and popular cryptanalytic method, errors in the analysis are often discovered and many papers in the literature present flaws. Wishing to solve that, Boura et al.i¾?[1] presented at ASIACRYPT'14 a generic vision of impossible differential attacks with the aim of simplifying and helping the ...
openaire   +1 more source

Improved Impossible Differential Cryptanalysis on SMS4

2010 International Conference on Communications and Intelligence Information Security, 2010
This paper presents an improved impossible differential attack on the block cipher SMS4 which is used in WAPI (the Chinese WLAN national standard). Combining with some new observations, this paper can filter out the wrong keys more efficiently, and present an impossible differential attack on 17-round SMS4, which updates the best known impossible ...
openaire   +1 more source

Impossible Differential Cryptanalysis on Tweaked E2

2012
E2, a 128-bit block cipher, is an AES candidate designed and submitted by NTT corporation. It employs a Feistel structure as global structure and 2-layer Substitution-Permutation Network structure in round function. The conservative structure makes E2 immune to kinds of current cryptanalysis.
Yuechuan Wei   +3 more
openaire   +1 more source

Impossible Differential Analysis on 8-Round PRINCE

2020
PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a 4-round impossible differential based on some observations on M′ operation and launched impossible differential attacks on 6- and 7 ...
Yaoling Ding   +3 more
openaire   +1 more source

Impossible Differential Cryptanalysis for Block Cipher Structures

2003
Impossible Differential Cryptanalysis(IDC) [4] uses impossible differential characteristics to retrieve a subkey material for the first or the last several rounds of block ciphers. Thus, the security of a block cipher against IDC can be evaluated by impossible differential characteristics. In this paper, we study impossible differential characteristics
Jongsung Kim   +5 more
openaire   +1 more source

Impossible Differential Cryptanalysis of Reduced-Round SKINNY

2017
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle et al. at CRYPTO 2016. SKINNY has 6 main variants where SKINNY-n-t is a block cipher that operates on n-bit blocks using t-bit tweakey (key and tweak) where \(n=64\) or 128 and \(t=n\), 2n, or 3n. In this paper, we present impossible differential attacks against reduced-round
Mohamed Tolba   +2 more
openaire   +1 more source

Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1

2014
Hierocrypt-L1 is one of the Japanese e-Government Recommended Ciphers listed by CRYPTREC in 2003, and its security was reconfirmed as secure by CRYPTREC in 2013. In this paper we first find differential characteristics with probability 1 in the key scheduling of Hierocrypt-L1.
Bungo Taga, Shiho Moriai, Kazumaro Aoki
openaire   +1 more source

New Impossible Differential Cryptanalysis on Improved LBlock

2013
LBlock is a 64-bit lightweight block cipher which can be implemented in both hardware environments and software platforms. It was proposed by Wu Wenling and Zhang Lei at ACNS2011. We studied the security of LBlock found that the permutation layer can getting better on security in the internet of things. In order to assure it can achieve enough security,
Xuan Liu, Feng Liu, Shuai Meng
openaire   +1 more source

Impossible Differential Cryptanalysis of Midori

Mechatronics and Automation Engineering, 2017
Z. Chen, X. Y. Wang
openaire   +1 more source

Home - About - Disclaimer - Privacy