Results 251 to 260 of about 147,541 (282)
Some of the next articles are maybe not open access.

Improved Impossible Differential Attacks on Reduced-Round MISTY1

2012
MISTY1 is a Feistel block cipher with a 64-bit block and a 128-bit key. It is one of the final NESSIE portfolio of block ciphers, and has been recommended for Japanese e-Government ciphers by the CRYPTREC project. In this paper, we improve the impossible differential attack on 6-round MISTY1 with 4 FL layers introduced by Dunkelman et al. with a factor
Keting Jia, Leibo Li
openaire   +1 more source

Improved Impossible Differential Attacks on Large-Block Rijndael

2008
In this paper, we present some improved impossible differential attacks on large-block Rijndael whose block sizes are larger than 128 bits. First of all, we present some important observations which help us to significantly improve the impossible differential attacks on large-block Rijndael proposed by Nakahara-Pavao (ISC 2007).
Lei Zhang   +4 more
openaire   +1 more source

11-Round impossible differential algebraic attack for serpent encryption algorithm

Wuhan University Journal of Natural Sciences, 2010
This paper explored algebraic features of nonlinear parts in Serpent encryption algorithm and offered an 11-round Serpent-128 impossible differential algebraic attack through utilizing the method in constructing S-box algebraic equations. The new method analyzed block 11-round Serpent with 2127 selected plaintexts and 2129 bytes memory space at the ...
Zhihua Hu, Zhongping Qin
openaire   +1 more source

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks

2016
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at least for well-known attack techniques, so that cryptanalysts will only focus on finding new attacks.
Derbez, Patrick, Fouque, Pierre-Alain
openaire   +2 more sources

Related-tweakey impossible differential attack on QARMA-128

Science China Information Sciences, 2021
Juan Du   +3 more
openaire   +1 more source

Impossible Differential Attack on 3D Cipher

Journal of Electronics & Information Technology, 2010
Xue-hai Tang   +3 more
openaire   +1 more source

Related-Key Impossible Differential Attacks on 8-Round AES-192

2006
In this paper we examine the strength of AES against the related-key impossible differential attack, following the work of Jakimoski and Desmedt [12]. We use several additional observations to substantially improve the data and time complexities of their attacks.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Impossible Differential Attack on Round‐Reduced SLIM

IEEJ Transactions on Electrical and Electronic Engineering
SLIM is a lightweight block cipher proposed by Aboushosha et al. and it is designed for RFID systems. It features 32‐bit block and 80‐bit key size. In this paper, we search for impossible differential distinguishers and related‐key differential distinguishers on SLIM by applying the ...
openaire   +1 more source

Home - About - Disclaimer - Privacy