Results 91 to 100 of about 3,178 (206)

Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]

open access: yes, 2014
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M.   +2 more
core  

Impossible Differential Cryptanalysis on Lai-Massey Scheme

open access: yesETRI Journal, 2014
The Lai-Massey scheme, proposed by Vaudenay, is a modified structure in the International Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the Lai-Massey scheme. Impossible differential cryptanalysis is a powerful technique used to recover the secret key of block ciphers.
Rui Guo, Chenhui Jin
openaire   +1 more source

A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks [PDF]

open access: yes, 2016
Information is a commodity. Information has economic value and production of it incurs cost. Securing the information is posing a considerable challenge.
Jothi, S. A. (S)
core  

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION [PDF]

open access: yesICTACT Journal on Communication Technology, 2010
In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated ...
B. Lakshmi, E. Kirubakaran, T.N.Prabakar
doaj  

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj   +1 more source

Randomized Response and Balanced Bloom Filters for Privacy Preserving Record Linkage [PDF]

open access: yes, 2017
In most European settings, record linkage across different institutions is based on encrypted personal identifiers – such as names, birthdays, or places of birth – to protect privacy.
Schnell, R.
core  

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs

open access: yesIACR Transactions on Symmetric Cryptology
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty   +3 more
doaj   +1 more source

Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. [PDF]

open access: yesEntropy (Basel), 2023
Kim H   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy