Results 21 to 30 of about 106,304 (243)

Quantum impossible differential and truncated differential cryptanalysis

open access: yes, 2017
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
Xie, Huiqin, Yang, Li
openaire   +2 more sources

Impossible differential cryptanalysis using matrix method

open access: yesDiscrete Mathematics, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kim, Jongsung   +2 more
openaire   +1 more source

Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this paper, a new method for evaluating the integral property, truncated and impossible differentials for substitution-permutation network (SPN) block ciphers is proposed. The main assumption is an explicit description/expression of the internal state
Wenying Zhang   +3 more
doaj   +1 more source

On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Among the few works realising the search of truncated differentials (TD) and multidimensional linear approximations (MDLA) holding for sure, the optimality of the distinguisher should be confirmed via an exhaustive search over all possible input ...
Ling Sun   +3 more
doaj   +1 more source

MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC

open access: yesIEEE Access, 2019
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj   +1 more source

Mind Your Path: On (Key) Dependencies in Differential Characteristics

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remains unclear how the subkey values and more generally the Markov assumption impacts exactly their probability estimation.
Thomas Peyrin, Quan Quan Tan
doaj   +1 more source

Methylation biomarkers can distinguish pleural mesothelioma from healthy pleura and other pleural pathologies

open access: yesMolecular Oncology, EarlyView.
We developed and validated a DNA methylation–based biomarker panel to distinguish pleural mesothelioma from other pleural conditions. Using the IMPRESS technology, we translated this panel into a clinically applicable assay. The resulting two classifier models demonstrated excellent performance, achieving high AUC values and strong diagnostic accuracy.
Janah Vandenhoeck   +12 more
wiley   +1 more source

New Insights on Impossible Differential Cryptanalysis [PDF]

open access: yes, 2012
Since its introduction, impossible differential cryptanalysis has been applied to many ciphers. Besides the specific application of the technique in various instances, there are some very basic results which apply to generic structures of ciphers, e.g., the well known 5-round impossible differential of Feistel ciphers with bijective round functions.
Charles Bouillaguet   +3 more
openaire   +1 more source

LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro

open access: yesMolecular Oncology, EarlyView.
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix   +13 more
wiley   +1 more source

Impossible differential distinguisher analysis of GRANULE and MANTRA algorithm

open access: yesTongxin xuebao, 2020
The lightweight block cipher algorithms called GRANULE and MANTRA have a simple structure,fast encryption speed,and they can be easy implemented in software and hardware.Two algorithms are especially suitable for resource-constrained environments.To ...
Xiaonian WU   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy