Results 231 to 240 of about 147,541 (282)

New impossible differential attacks on reduced-round Crypton

Computer Standards & Interfaces, 2010
Crypton is a 128-bit block cipher which was submitted to the Advanced Encryption Standard competition. In this paper, we present two new impossible differential attacks to reduced-round Crypton. Using two new observations on the diffusion layer of Crypton, exploiting a 4-round impossible differential, and appropriately choosing three additional rounds,
Hamid Mala   +2 more
openaire   +3 more sources

General Impossible Differential Attack on 7-Round AES

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010
Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α, β).
Meiling ZHANG   +3 more
openaire   +3 more sources

A new impossible differential attack on SAFER ciphers

Computers & Electrical Engineering, 2010
This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al. We analyze 3.75-round SAFER SK-64, using 2^4^5 chosen plaintexts, 2^3^8 bytes memory and 2^4^2 half round computations. Furthermore, the new impossible differential attack on 3.75-round SAFER+/128
Shihui Zheng, Licheng Wang, Yixian Yang
openaire   +3 more sources

Impossible differential attack on 13-round Camellia-192

Information Processing Letters, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Céline Blondeau
openaire   +5 more sources

Related-Key Impossible Differential Attack on Reduced-Round LBlock

Journal of Computer Science and Technology, 2014
LBlock is a 32-round lightweight block cipher with 64-bit block size and 80-bit key. This paper identifies 16-round related-key impossible differentials of LBlock, which are better than the 15-round related-key impossible differentials used in the previous attack.
Long Wen, Mei-Qin Wang, Jing-Yuan Zhao
openaire   +3 more sources

Impossible differential attack on Simpira v2

Science China Information Sciences, 2017
Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016, and can be used to construct high throughput block ciphers by using the Even-Mansour construction, permutation-based hashing, and wide-block authenticated encryption. This paper shows a 9-round impossible differential of Simpira-4. To the best of our knowledge, this is the
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire   +1 more source

Impossible Differential Attacks on 13-Round CLEFIA-128

Journal of Computer Science and Technology, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mala, Hamid   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy