Results 91 to 100 of about 3,178 (206)
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
Azimi SA +5 more
europepmc +1 more source
Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M. +2 more
core
Impossible Differential Cryptanalysis on Lai-Massey Scheme
The Lai-Massey scheme, proposed by Vaudenay, is a modified structure in the International Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the Lai-Massey scheme. Impossible differential cryptanalysis is a powerful technique used to recover the secret key of block ciphers.
Rui Guo, Chenhui Jin
openaire +1 more source
A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks [PDF]
Information is a commodity. Information has economic value and production of it incurs cost. Securing the information is posing a considerable challenge.
Jothi, S. A. (S)
core
FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION [PDF]
In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated ...
B. Lakshmi, E. Kirubakaran, T.N.Prabakar
doaj
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj +1 more source
Randomized Response and Balanced Bloom Filters for Privacy Preserving Record Linkage [PDF]
In most European settings, record linkage across different institutions is based on encrypted personal identifiers – such as names, birthdays, or places of birth – to protect privacy.
Schnell, R.
core
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty +3 more
doaj +1 more source
A new distinguishing attack on reduced round ChaCha permutation. [PDF]
Dey C, Sarkar S.
europepmc +1 more source
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited. [PDF]
Kim H +6 more
europepmc +1 more source

