Results 221 to 230 of about 10,795 (238)
Some of the next articles are maybe not open access.

Improved Impossible Differential Attacks on Large-Block Rijndael

2008
In this paper, we present some improved impossible differential attacks on large-block Rijndael whose block sizes are larger than 128 bits. First of all, we present some important observations which help us to significantly improve the impossible differential attacks on large-block Rijndael proposed by Nakahara-Pavao (ISC 2007).
Lei Zhang   +4 more
openaire   +1 more source

11-Round impossible differential algebraic attack for serpent encryption algorithm

Wuhan University Journal of Natural Sciences, 2010
This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box algebraic equations. The new method analyzed block 11-round Serpent with 2127 selected plaintexts and 2129 bytes memory space at the ...
Zhihua Hu, Zhongping Qin
openaire   +1 more source

Impossible Differential Attack on Reduced Round SPARX-64/128

2017
SPARX-64/128 is an ARX-based block cipher with 64-bit block size and 128-bit key. It was published in ASIACRYPT 2016 as one of the instantiations of a family of ARX-based block ciphers with provable security against single-characteristic differential and linear cryptanalysis.
Ahmed Abdelkhalek   +2 more
openaire   +1 more source

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks

2016
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at least for well-known attack techniques, so that cryptanalysts will only focus on finding new attacks.
Derbez, Patrick, Fouque, Pierre-Alain
openaire   +2 more sources

Related-tweakey impossible differential attack on QARMA-128

Science China Information Sciences, 2021
Juan Du   +3 more
openaire   +1 more source

Impossible Differential Attack on 3D Cipher

Journal of Electronics & Information Technology, 2010
Xue-hai Tang   +3 more
openaire   +1 more source

Related-Key Impossible Differential Attacks on 8-Round AES-192

2006
In this paper we examine the strength of AES against the related-key impossible differential attack, following the work of Jakimoski and Desmedt [12]. We use several additional observations to substantially improve the data and time complexities of their attacks.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Impossible Differential Attack on Round‐Reduced SLIM

IEEJ Transactions on Electrical and Electronic Engineering
SLIM is a lightweight block cipher proposed by Aboushosha et al. and it is designed for RFID systems. It features 32‐bit block and 80‐bit key size. In this paper, we search for impossible differential distinguishers and related‐key differential distinguishers on SLIM by applying the ...
openaire   +1 more source

Home - About - Disclaimer - Privacy