Results 221 to 230 of about 10,795 (238)
Some of the next articles are maybe not open access.
Improved Impossible Differential Attacks on Large-Block Rijndael
2008In this paper, we present some improved impossible differential attacks on large-block Rijndael whose block sizes are larger than 128 bits. First of all, we present some important observations which help us to significantly improve the impossible differential attacks on large-block Rijndael proposed by Nakahara-Pavao (ISC 2007).
Lei Zhang +4 more
openaire +1 more source
11-Round impossible differential algebraic attack for serpent encryption algorithm
Wuhan University Journal of Natural Sciences, 2010This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box algebraic equations. The new method analyzed block 11-round Serpent with 2127 selected plaintexts and 2129 bytes memory space at the ...
Zhihua Hu, Zhongping Qin
openaire +1 more source
Impossible Differential Attack on Reduced Round SPARX-64/128
2017SPARX-64/128 is an ARX-based block cipher with 64-bit block size and 128-bit key. It was published in ASIACRYPT 2016 as one of the instantiations of a family of ARX-based block ciphers with provable security against single-characteristic differential and linear cryptanalysis.
Ahmed Abdelkhalek +2 more
openaire +1 more source
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
2016Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at least for well-known attack techniques, so that cryptanalysts will only focus on finding new attacks.
Derbez, Patrick, Fouque, Pierre-Alain
openaire +2 more sources
Related-tweakey impossible differential attack on QARMA-128
Science China Information Sciences, 2021Juan Du +3 more
openaire +1 more source
Impossible Differential Attack on 3D Cipher
Journal of Electronics & Information Technology, 2010Xue-hai Tang +3 more
openaire +1 more source
Related-Key Impossible Differential Attacks on 8-Round AES-192
2006In this paper we examine the strength of AES against the related-key impossible differential attack, following the work of Jakimoski and Desmedt [12]. We use several additional observations to substantially improve the data and time complexities of their attacks.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire +1 more source
Impossible Differential Attack on Round‐Reduced
SLIM is a lightweight block cipher proposed by Aboushosha et al. and it is designed for RFID systems. It features 32‐bit block and 80‐bit key size. In this paper, we search for impossible differential distinguishers and related‐key differential distinguishers on SLIM by applying the ...
openaire +1 more source
On Data Complexities of Reciprocal Impossible Differential Attacks
SSRN Electronic Journal, 2022openaire +1 more source

