Results 211 to 220 of about 10,795 (238)
Some of the next articles are maybe not open access.

Impossible Differential Attacks on Reduced-Round LBlock

2012
LBlock is a lightweight block cipher with 32 rounds, which can be implemented efficiently not only in hardware environment but also in software platforms. In this paper, by exploiting the structure of LBlock and the redundancy in its key schedule, we propose an impossible differential attack on 21-round LBlock based on a 14-round impossible ...
Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
openaire   +1 more source

Note on Impossible Differential Attacks

2016
While impossible differential cryptanalysis is a well-known and popular cryptanalytic method, errors in the analysis are often discovered and many papers in the literature present flaws. Wishing to solve that, Boura et al.i¾?[1] presented at ASIACRYPT'14 a generic vision of impossible differential attacks with the aim of simplifying and helping the ...
openaire   +1 more source

Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1

2014
Hierocrypt-L1 is one of the Japanese e-Government Recommended Ciphers listed by CRYPTREC in 2003, and its security was reconfirmed as secure by CRYPTREC in 2013. In this paper we first find differential characteristics with probability 1 in the key scheduling of Hierocrypt-L1.
Bungo Taga, Shiho Moriai, Kazumaro Aoki
openaire   +1 more source

A new impossible differential attack on SAFER ciphers

Computers & Electrical Engineering, 2010
This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al. We analyze 3.75-round SAFER SK-64, using 2^4^5 chosen plaintexts, 2^3^8 bytes memory and 2^4^2 half round computations. Furthermore, the new impossible differential attack on 3.75-round SAFER+/128
Shihui Zheng, Licheng Wang, Yixian Yang
openaire   +1 more source

Impossible Differential Attack on 30-Round SHACAL-2

2003
SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. Up to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack.
Seokhie Hong   +5 more
openaire   +1 more source

New Related-Key Impossible Differential Attack on MIBS-80

2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2016
MIBS is a lightweight block cipher designed by M. Izadi et al in 2009 for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds. It with 64-bit block size and supports 64/80-bit key size.
Lu Cheng, Peng Xu, Yuechuan Wei
openaire   +1 more source

Impossible differential attack on 13-round Camellia-192

Information Processing Letters, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

Improved Impossible Differential Attack on Reduced-Round LBlock

2016
LBlock is a 32-round lightweight block cipher with a 64-bit block size and an 80-bit key. This paper presents a new impossible differential attack on LBlock by improving the previous best result for 1 more round. Based on the nibble conditions, detailed differential properties of LBlock S-Boxes and thorough exploration of subkey relations, we set up ...
Ning Wang, Xiaoyun Wang, Keting Jia
openaire   +1 more source

Improved Impossible Differential Attacks on Reduced-Round MISTY1

2012
MISTY1 is a Feistel block cipher with a 64-bit block and a 128-bit key. It is one of the final NESSIE portfolio of block ciphers, and has been recommended for Japanese e-Government ciphers by the CRYPTREC project. In this paper, we improve the impossible differential attack on 6-round MISTY1 with 4 FL layers introduced by Dunkelman et al. with a factor
Keting Jia, Leibo Li
openaire   +1 more source

Related-Key Impossible Differential Attack on Reduced-Round LBlock

Journal of Computer Science and Technology, 2014
LBlock is a 32-round lightweight block cipher with 64-bit block size and 80-bit key. This paper identifies 16-round related-key impossible differentials of LBlock, which are better than the 15-round related-key impossible differentials used in the previous attack.
Long Wen, Mei-Qin Wang, Jing-Yuan Zhao
openaire   +1 more source

Home - About - Disclaimer - Privacy