Results 171 to 180 of about 3,190 (199)
Some of the next articles are maybe not open access.

Impossible differential cryptanalysis on cipher E2

Concurrency and Computation: Practice and Experience, 2013
SUMMARYE2, a block cipher, is an Advanced Encryption Standard candidate designed and submitted by Nippon Telegraph and Telephone Corporation. It employs a Feistel structure as global structure and two‐layer substitution–permutation network structure in round function.
Yuechuan Wei, Xiaoyuan Yang, Chao Li
openaire   +1 more source

Impossible Differential Cryptanalysis on Tweaked E2

2012
E2, a 128-bit block cipher, is an AES candidate designed and submitted by NTT corporation. It employs a Feistel structure as global structure and 2-layer Substitution-Permutation Network structure in round function. The conservative structure makes E2 immune to kinds of current cryptanalysis.
Yuechuan Wei   +3 more
openaire   +1 more source

Improved Impossible Differential Cryptanalysis of SMS4

2012 Eighth International Conference on Computational Intelligence and Security, 2012
The SMS4 is the first commercial block cipher published by Chinese government. It's a 32-round block cipher encrypted by 128-bit keys. By analyzing the changes of the difference between input and output pairs in each round, this paper presents a new impossible differential path of the 14- round SMS4.
Tao Shi, Wei Wang, Qiuliang Xu
openaire   +1 more source

Improved Impossible Differential Cryptanalysis on SMS4

2010 International Conference on Communications and Intelligence Information Security, 2010
This paper presents an improved impossible differential attack on the block cipher SMS4 which is used in WAPI (the Chinese WLAN national standard). Combining with some new observations, this paper can filter out the wrong keys more efficiently, and present an impossible differential attack on 17-round SMS4, which updates the best known impossible ...
openaire   +1 more source

Impossible Differential Cryptanalysis on Deoxys-BC-256

2018
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal ...
Moazami, F.   +2 more
openaire   +1 more source

Impossible Differential Cryptanalysis for Block Cipher Structures

2003
Impossible Differential Cryptanalysis(IDC) [4] uses impossible differential characteristics to retrieve a subkey material for the first or the last several rounds of block ciphers. Thus, the security of a block cipher against IDC can be evaluated by impossible differential characteristics. In this paper, we study impossible differential characteristics
Jongsung Kim   +5 more
openaire   +1 more source

Impossible Differential Cryptanalysis of Reduced-Round SKINNY

2017
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle et al. at CRYPTO 2016. SKINNY has 6 main variants where SKINNY-n-t is a block cipher that operates on n-bit blocks using t-bit tweakey (key and tweak) where \(n=64\) or 128 and \(t=n\), 2n, or 3n. In this paper, we present impossible differential attacks against reduced-round
Mohamed Tolba   +2 more
openaire   +1 more source

Cryptanalysis of Midori128 Using Impossible Differential Techniques

2016
The Midori family of light weight block cipher is presented in ASIACRYPT2015. It is uses a SPN structure and has two versions: Midori64 and Midori128. In this paper we use a 6-round impossible differential path and present 10-round impossible differential attack on Midori128. We exploit the properties of S-boxes to aid our attack.
Zhan Chen, Huaifeng Chen, Xiaoyun Wang
openaire   +1 more source

New Impossible Differential Cryptanalysis on Improved LBlock

2013
LBlock is a 64-bit lightweight block cipher which can be implemented in both hardware environments and software platforms. It was proposed by Wu Wenling and Zhang Lei at ACNS2011. We studied the security of LBlock found that the permutation layer can getting better on security in the internet of things. In order to assure it can achieve enough security,
Xuan Liu, Feng Liu, Shuai Meng
openaire   +1 more source

Integral and Impossible Differential Cryptanalysis of RC6

2018
The block cipher RC6 is one of the finalists of the five candidates of AES for its security, simplicity and easy soft-hardware implementation. In view of its importance, the resistance of RC6 against integral cryptanalysis and impossible differential cryptanalysis is evaluated in this paper.
Hongguo Zhu, Xin Hai, Jiuchuan Lin
openaire   +1 more source

Home - About - Disclaimer - Privacy