Results 21 to 30 of about 147,541 (282)

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi   +2 more
doaj   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

On the Security of the Yi-Tan-Siew Chaos-Based Cipher [PDF]

open access: yes, 2004
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break ...
Chen, Guanrong, Li, Shujun, Mou, Xuanqin
core   +2 more sources

Application of dynamical systems theory to the high angle of attack dynamics of the F-14 [PDF]

open access: yes, 1990
Dynamical systems theory has been used to study the nonlinear dynamics of the F-14. An eight degree of freedom model that does not include the control system present in operational F-14's has been analyzed.
Culick, Fred E. C., Jahnke, Craig C.
core   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

An Improved Impossible Differential Attack on MISTY1 [PDF]

open access: yes, 2008
MISTY1 is a Feistel block cipher that received a great deal of cryptographic attention. Its recursive structure, as well as the added FL layers, have been successful in thwarting various cryptanalytic techniques. The best known attacks on reduced variants of the cipher are on either a 4-round variant with the FL functions, or a 6-round variant without ...
Orr Dunkelman, Nathan Keller
openaire   +1 more source

Improved Cryptanalysis of Reduced-Version QARMA-64/128

open access: yesIEEE Access, 2020
QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future.
Ya Liu   +5 more
doaj   +1 more source

Cryptanalysis of NBC-128

open access: yesDianzi Jishu Yingyong, 2021
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai   +3 more
doaj   +1 more source

Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this paper, a new method for evaluating the integral property, truncated and impossible differentials for substitution-permutation network (SPN) block ciphers is proposed. The main assumption is an explicit description/expression of the internal state
Wenying Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy