Results 201 to 210 of about 10,795 (238)
FAIR and Square: Privacy Compliance Framework for Healthcare Databases
Zhu Z +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Impossible differential attack on Simpira v2
Science China Information Sciences, 2017Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016, and can be used to construct high throughput block ciphers by using the Even-Mansour construction, permutation-based hashing, and wide-block authenticated encryption. This paper shows a 9-round impossible differential of Simpira-4. To the best of our knowledge, this is the
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire +1 more source
Impossible Differential Attacks on 13-Round CLEFIA-128
Journal of Computer Science and Technology, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mala, Hamid +2 more
openaire +1 more source
New Impossible Differential Attacks on AES
2008In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to better impossible differential attacks on 7-round AES-128 and ...
Lu, J. +3 more
openaire +2 more sources
New Impossible Differential Attacks on Camellia
2012Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 FL/FL−1 layers, which turn out to be the first 7-round impossible differentials with 2 FL/FL−1 layers.
Dongxia Bai, Leibo Li
openaire +1 more source
New impossible differential attacks on reduced-round Crypton
Computer Standards & Interfaces, 2010Crypton is a 128-bit block cipher which was submitted to the Advanced Encryption Standard competition. In this paper, we present two new impossible differential attacks to reduced-round Crypton. Using two new observations on the diffusion layer of Crypton, exploiting a 4-round impossible differential, and appropriately choosing three additional rounds,
Hamid Mala +2 more
openaire +1 more source
Impossible-Differential Attacks on Large-Block Rijndael
2007This paper reports impossible-differential (ID) attacks on reduced-round versions of the Rijndael cipher with text blocks larger than 128 bits. These attacks follow the framework of the attacks by Biham-Keller and Cheon et al. on the AES, and reach up to seven rounds of large-block Rijndael variants.
Jorge Nakahara, Ivan Carlos Pavão
openaire +1 more source
Impossible Differential Attack on Reduced-Round TWINE
2014TWINE, proposed at the ECRYPT Workshop on Lightweight Cryptography in 2011, is a 64-bit lightweight block cipher consisting of 36 rounds with 80-bit or 128-bit keys. In this paper, we give impossible differential attacks on both versions of the cipher, which is an improvement over what the designers claimed to be the best possible. Although our results
Xuexin Zheng, Keting Jia
openaire +1 more source
General Impossible Differential Attack on 7-Round AES
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α, β).
Meiling ZHANG +3 more
openaire +1 more source

