Results 161 to 170 of about 3,178 (206)
Some of the next articles are maybe not open access.
Impossible Differential Cryptanalysis of SPECK
2019The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and
Mingming Li +3 more
openaire +1 more source
Impossible differential cryptanalysis on cipher E2
Concurrency and Computation: Practice and Experience, 2013SUMMARYE2, a block cipher, is an Advanced Encryption Standard candidate designed and submitted by Nippon Telegraph and Telephone Corporation. It employs a Feistel structure as global structure and two‐layer substitution–permutation network structure in round function.
Yuechuan Wei, Xiaoyuan Yang, Chao Li
openaire +1 more source
Impossible Differential Cryptanalysis on Tweaked E2
2012E2, a 128-bit block cipher, is an AES candidate designed and submitted by NTT corporation. It employs a Feistel structure as global structure and 2-layer Substitution-Permutation Network structure in round function. The conservative structure makes E2 immune to kinds of current cryptanalysis.
Yuechuan Wei +3 more
openaire +1 more source
Improved Impossible Differential Cryptanalysis of SMS4
2012 Eighth International Conference on Computational Intelligence and Security, 2012The SMS4 is the first commercial block cipher published by Chinese government. It's a 32-round block cipher encrypted by 128-bit keys. By analyzing the changes of the difference between input and output pairs in each round, this paper presents a new impossible differential path of the 14- round SMS4.
Tao Shi, Wei Wang, Qiuliang Xu
openaire +1 more source
IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES
Cryptologia, 2003Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.
openaire +2 more sources
Improved Impossible Differential Cryptanalysis on SMS4
2010 International Conference on Communications and Intelligence Information Security, 2010This paper presents an improved impossible differential attack on the block cipher SMS4 which is used in WAPI (the Chinese WLAN national standard). Combining with some new observations, this paper can filter out the wrong keys more efficiently, and present an impossible differential attack on 17-round SMS4, which updates the best known impossible ...
openaire +1 more source
Related‐Key Impossible Differential Cryptanalysis of LBlock
Chinese Journal of Electronics, 2017A related-key impossible differential attack on 24-round LBlock is constructed by using new 16-round related-key impossible differentials and adding 4 rounds at the top and 4 rounds at the bottom of these 16-round related-key impossible differential paths.
Minm Xie, Jingjing Li, Yuechuan Zang
openaire +1 more source
Impossible Differential Cryptanalysis on Deoxys-BC-256
2018Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal ...
Moazami, F. +2 more
openaire +1 more source
On computational complexity of impossible differential cryptanalysis
Information Processing Letters, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shakiba, Mohsen +2 more
openaire +1 more source
Impossible Differential Cryptanalysis for Block Cipher Structures
2003Impossible Differential Cryptanalysis(IDC) [4] uses impossible differential characteristics to retrieve a subkey material for the first or the last several rounds of block ciphers. Thus, the security of a block cipher against IDC can be evaluated by impossible differential characteristics. In this paper, we study impossible differential characteristics
Jongsung Kim +5 more
openaire +1 more source

