Results 231 to 240 of about 147,541 (282)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
New impossible differential attacks on reduced-round Crypton
Computer Standards & Interfaces, 2010Crypton is a 128-bit block cipher which was submitted to the Advanced Encryption Standard competition. In this paper, we present two new impossible differential attacks to reduced-round Crypton. Using two new observations on the diffusion layer of Crypton, exploiting a 4-round impossible differential, and appropriately choosing three additional rounds,
Hamid Mala +2 more
openaire +3 more sources
General Impossible Differential Attack on 7-Round AES
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α, β).
Meiling ZHANG +3 more
openaire +3 more sources
A new impossible differential attack on SAFER ciphers
Computers & Electrical Engineering, 2010This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al. We analyze 3.75-round SAFER SK-64, using 2^4^5 chosen plaintexts, 2^3^8 bytes memory and 2^4^2 half round computations. Furthermore, the new impossible differential attack on 3.75-round SAFER+/128
Shihui Zheng, Licheng Wang, Yixian Yang
openaire +3 more sources
Impossible differential attack on 13-round Camellia-192
Information Processing Letters, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Céline Blondeau
openaire +5 more sources
Related-Key Impossible Differential Attack on Reduced-Round LBlock
Journal of Computer Science and Technology, 2014LBlock is a 32-round lightweight block cipher with 64-bit block size and 80-bit key. This paper identifies 16-round related-key impossible differentials of LBlock, which are better than the 15-round related-key impossible differentials used in the previous attack.
Long Wen, Mei-Qin Wang, Jing-Yuan Zhao
openaire +3 more sources
Impossible differential attack on Simpira v2
Science China Information Sciences, 2017Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016, and can be used to construct high throughput block ciphers by using the Even-Mansour construction, permutation-based hashing, and wide-block authenticated encryption. This paper shows a 9-round impossible differential of Simpira-4. To the best of our knowledge, this is the
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire +1 more source
Impossible Differential Attacks on 13-Round CLEFIA-128
Journal of Computer Science and Technology, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mala, Hamid +2 more
openaire +1 more source

