Results 161 to 170 of about 3,178 (206)
Some of the next articles are maybe not open access.

Impossible Differential Cryptanalysis of SPECK

2019
The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and
Mingming Li   +3 more
openaire   +1 more source

Impossible differential cryptanalysis on cipher E2

Concurrency and Computation: Practice and Experience, 2013
SUMMARYE2, a block cipher, is an Advanced Encryption Standard candidate designed and submitted by Nippon Telegraph and Telephone Corporation. It employs a Feistel structure as global structure and two‐layer substitution–permutation network structure in round function.
Yuechuan Wei, Xiaoyuan Yang, Chao Li
openaire   +1 more source

Impossible Differential Cryptanalysis on Tweaked E2

2012
E2, a 128-bit block cipher, is an AES candidate designed and submitted by NTT corporation. It employs a Feistel structure as global structure and 2-layer Substitution-Permutation Network structure in round function. The conservative structure makes E2 immune to kinds of current cryptanalysis.
Yuechuan Wei   +3 more
openaire   +1 more source

Improved Impossible Differential Cryptanalysis of SMS4

2012 Eighth International Conference on Computational Intelligence and Security, 2012
The SMS4 is the first commercial block cipher published by Chinese government. It's a 32-round block cipher encrypted by 128-bit keys. By analyzing the changes of the difference between input and output pairs in each round, this paper presents a new impossible differential path of the 14- round SMS4.
Tao Shi, Wei Wang, Qiuliang Xu
openaire   +1 more source

IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES

Cryptologia, 2003
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.
openaire   +2 more sources

Improved Impossible Differential Cryptanalysis on SMS4

2010 International Conference on Communications and Intelligence Information Security, 2010
This paper presents an improved impossible differential attack on the block cipher SMS4 which is used in WAPI (the Chinese WLAN national standard). Combining with some new observations, this paper can filter out the wrong keys more efficiently, and present an impossible differential attack on 17-round SMS4, which updates the best known impossible ...
openaire   +1 more source

Related‐Key Impossible Differential Cryptanalysis of LBlock

Chinese Journal of Electronics, 2017
A related-key impossible differential attack on 24-round LBlock is constructed by using new 16-round related-key impossible differentials and adding 4 rounds at the top and 4 rounds at the bottom of these 16-round related-key impossible differential paths.
Minm Xie, Jingjing Li, Yuechuan Zang
openaire   +1 more source

Impossible Differential Cryptanalysis on Deoxys-BC-256

2018
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal ...
Moazami, F.   +2 more
openaire   +1 more source

On computational complexity of impossible differential cryptanalysis

Information Processing Letters, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shakiba, Mohsen   +2 more
openaire   +1 more source

Impossible Differential Cryptanalysis for Block Cipher Structures

2003
Impossible Differential Cryptanalysis(IDC) [4] uses impossible differential characteristics to retrieve a subkey material for the first or the last several rounds of block ciphers. Thus, the security of a block cipher against IDC can be evaluated by impossible differential characteristics. In this paper, we study impossible differential characteristics
Jongsung Kim   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy