Results 201 to 210 of about 10,795 (238)

FAIR and Square: Privacy Compliance Framework for Healthcare Databases

open access: yes
Zhu Z   +7 more
europepmc   +1 more source

Impossible differential attack on Simpira v2

Science China Information Sciences, 2017
Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016, and can be used to construct high throughput block ciphers by using the Even-Mansour construction, permutation-based hashing, and wide-block authenticated encryption. This paper shows a 9-round impossible differential of Simpira-4. To the best of our knowledge, this is the
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire   +1 more source

Impossible Differential Attacks on 13-Round CLEFIA-128

Journal of Computer Science and Technology, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mala, Hamid   +2 more
openaire   +1 more source

New Impossible Differential Attacks on AES

2008
In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to better impossible differential attacks on 7-round AES-128 and ...
Lu, J.   +3 more
openaire   +2 more sources

New Impossible Differential Attacks on Camellia

2012
Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 FL/FL−1 layers, which turn out to be the first 7-round impossible differentials with 2 FL/FL−1 layers.
Dongxia Bai, Leibo Li
openaire   +1 more source

New impossible differential attacks on reduced-round Crypton

Computer Standards & Interfaces, 2010
Crypton is a 128-bit block cipher which was submitted to the Advanced Encryption Standard competition. In this paper, we present two new impossible differential attacks to reduced-round Crypton. Using two new observations on the diffusion layer of Crypton, exploiting a 4-round impossible differential, and appropriately choosing three additional rounds,
Hamid Mala   +2 more
openaire   +1 more source

Impossible-Differential Attacks on Large-Block Rijndael

2007
This paper reports impossible-differential (ID) attacks on reduced-round versions of the Rijndael cipher with text blocks larger than 128 bits. These attacks follow the framework of the attacks by Biham-Keller and Cheon et al. on the AES, and reach up to seven rounds of large-block Rijndael variants.
Jorge Nakahara, Ivan Carlos Pavão
openaire   +1 more source

Impossible Differential Attack on Reduced-Round TWINE

2014
TWINE, proposed at the ECRYPT Workshop on Lightweight Cryptography in 2011, is a 64-bit lightweight block cipher consisting of 36 rounds with 80-bit or 128-bit keys. In this paper, we give impossible differential attacks on both versions of the cipher, which is an improvement over what the designers claimed to be the best possible. Although our results
Xuexin Zheng, Keting Jia
openaire   +1 more source

General Impossible Differential Attack on 7-Round AES

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010
Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α, β).
Meiling ZHANG   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy