Results 1 to 10 of about 12,474 (214)

A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]

open access: bronzeDes Codes Cryptogr, 2022
ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR. To evaluate the resistance of an ARX cipher against differential and impossible-differential cryptanalysis, the recent automated methods employ constraint ...
Azimi SA   +5 more
europepmc   +4 more sources

Impossible differential cryptanalysis of lightweight tweakable block cipher CRAFT [PDF]

open access: diamondCybersecurity
The CRAFT cipher is a lightweight tweakable block cipher introduced at FSE 2019. Its design aims to incorporate countermeasures against Differential Fault Attacks at the algorithmic level.
Fen Liu   +5 more
doaj   +3 more sources

Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE [PDF]

open access: bronzeProgress in Cryptology - AFRICACRYPT 202012th International Conference on Cryptology in Africa, 2020
Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto et al. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS). It is based on the TWINE block
Tolba M, ElSheikh M, Youssef A.
europepmc   +4 more sources

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: goldIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +3 more sources

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model [PDF]

open access: diamondKSII Transactions on Internet and Information Systems, 2021
MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the ...
Xiaonian Wu   +5 more
openalex   +2 more sources

New Results in Reduced Round AES - 256 Impossible Differential Cryptanalysis [PDF]

open access: diamondInternational Journal of Computing and Digital Systems, 2020
: Security of Crypto systems is usually analyzed through different cryptanalytic methods. Since Advance Encryption Standard (AES) is one of the most widely used and popular block cipher, a number of attacks have already been proposed on it.
K.B. Jithendra, T. K. Shahana, Fred Lacy
openalex   +2 more sources

Related-Key Multiple Impossible Differential Cryptanalysis on Full-Round LiCi-2 Designed for IoT [PDF]

open access: hybridSecurity and Communication Networks, 2022
LiCi-2 is an ultralightweight block cipher designed for constrained IoT devices. It is a successor of LiCi and has even better performance in both software and hardware implementation.
Kai Zhang   +6 more
openalex   +2 more sources

Impossible Differential Cryptanalysis of Surge

open access: diamondIOP Conference Series: Earth and Environment, 2020
In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively.
Zhiqiang Qu, Xuan Shen, Jun He
openalex   +2 more sources

Research on the Security Level of μ2 against Impossible Differential cryptanalysis [PDF]

open access: diamondKSII Transactions on Internet and Information Systems, 2022
Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu
openalex   +2 more sources

On the Complexity of Impossible Differential Cryptanalysis [PDF]

open access: hybridSecur. Commun. Networks, 2018
While impossible differential attack is one of the most well-known and familiar techniques for symmetric-key cryptanalysts, its subtlety and complicacy make the construction and verification of such attacks difficult and error-prone.
Qianqian Yang   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy