Results 31 to 40 of about 147,541 (282)
Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol [PDF]
In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from
Tsurumaru, Toyohiro
core +2 more sources
Security Analysis of SKINNY under Related-Tweakey Settings
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-n-t, where n represents the block size and t represents the tweakey length, the design specifies t ∈ {n, 2n, 3n}. In this
Guozhen Liu, Mohona Ghosh, Ling Song
doaj +1 more source
Among the few works realising the search of truncated differentials (TD) and multidimensional linear approximations (MDLA) holding for sure, the optimality of the distinguisher should be confirmed via an exhaustive search over all possible input ...
Ling Sun +3 more
doaj +1 more source
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver
In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have ...
Shion Utsumi +2 more
doaj +1 more source
A New Automatic Tool Searching for Impossible Differential of NIST Candidate ACE
The ACE algorithm is a candidate of the Lightweight Cryptography standardization process started by the National Institute of Standards and Technology (NIST) of the USA that passed the first round and successfully entered the second round. It is designed
Jingyi Liu, Guoqiang Liu, Longjiang Qu
doaj +1 more source
Related-Key Impossible Differential Attacks on Crypton
Crypton is a 12-round block cipher proposed as an AES candidate and Crtpton v1.0 is the revised version. In this paper, we present two related-key impossible differential attacks to reduced-round Crypton and Crypton v1.0. By carefully choosing the relations of keys, constructing some 6round related-key differential trials and using some observations on
Yuechuan Wei, Chao Li, Bing Sun
openaire +1 more source
Cryptanalysis of Reduced-Round SPECK
SPECK, a family of lightweight block ciphers proposed by the National Security Agency (NSA), is widely used under resource constrained environment. There are many cryptanalytic results on SPECK concentrated on differential and linear attacks.
Jiongjiong Ren, Shaozhen Chen
doaj +1 more source
Improved Impossible Differential Attacks on Large-Block Rijndael [PDF]
In this paper, we present more powerful 6-round impossible differentials for large-block Rijndael-224 and Rijndael-256 than the ones used by Zhang et al. in ISC 2008. Using those, we can improve the previous impossible differential cryptanalysis of both 9-round Rijndael-224 and Rijndael-256.
Wang, Qingju +5 more
openaire +2 more sources
Related-key impossible differential attack on a lightweight block cipher MIBS
The strength of MIBS algorithm against the related-key impossible differential attack was examined. MIBS is a lightweight block cipher algorithm.
Ping CHEN, Fu-cheng LIAO, Hong-ru WEI
doaj +2 more sources
Cryptanalysis of LowMC instances using single plaintext/ciphertext pair
Arguably one of the main applications of the LowMC family ciphers is in the post-quantum signature scheme PICNIC. Although LowMC family ciphers have been studied from a cryptanalytic point of view before, none of these studies were directly concerned ...
Subhadeep Banik +3 more
doaj +3 more sources

