Results 11 to 20 of about 3,190 (199)
Impossible differential cryptanalysis using matrix method
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kim, Jongsung +2 more
openaire +3 more sources
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
Azimi SA +5 more
europepmc +2 more sources
A New Automatic Tool Searching for Impossible Differential of NIST Candidate ACE
The ACE algorithm is a candidate of the Lightweight Cryptography standardization process started by the National Institute of Standards and Technology (NIST) of the USA that passed the first round and successfully entered the second round. It is designed
Jingyi Liu, Guoqiang Liu, Longjiang Qu
doaj +1 more source
Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba +4 more
doaj +1 more source
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov +25 more
core +3 more sources
Impossible Differential Cryptanalysis of Zodiac [PDF]
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong +4 more
openaire +1 more source
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources
The (related-key) impossible boomerang attack and its application to the AES block cipher [PDF]
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005.
Jiqiang Lu
core +1 more source
Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources

