Results 21 to 30 of about 3,178 (206)

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

New Security Proofs and Complexity Records for Advanced Encryption Standard

open access: yesIEEE Access, 2023
Common block ciphers like AES specified by the NIST or KASUMI (A5/3) of GSM are extensively utilized by billions of individuals globally to protect their privacy and maintain confidentiality in daily communications.
Orhun Kara
doaj   +1 more source

Cryptanalysis of Reduced-Round SPECK

open access: yesIEEE Access, 2019
SPECK, a family of lightweight block ciphers proposed by the National Security Agency (NSA), is widely used under resource constrained environment. There are many cryptanalytic results on SPECK concentrated on differential and linear attacks.
Jiongjiong Ren, Shaozhen Chen
doaj   +1 more source

Impossible differential cryptanalysis using matrix method

open access: yesDiscrete Mathematics, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kim, Jongsung   +2 more
openaire   +1 more source

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]

open access: yes, 2016
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle   +12 more
core   +2 more sources

Subspace Trail Cryptanalysis and its Applications to AES

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi   +2 more
doaj   +1 more source

A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [PDF]

open access: yes, 2009
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named "Multimedia Cryptography System" (MCS). No cryptanalytic results have been reported so far. This paper presents a differential attack to break MCS, which
Kyamakya, Kyandoghere   +3 more
core   +1 more source

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi   +2 more
doaj   +1 more source

Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this paper, a new method for evaluating the integral property, truncated and impossible differentials for substitution-permutation network (SPN) block ciphers is proposed. The main assumption is an explicit description/expression of the internal state
Wenying Zhang   +3 more
doaj   +1 more source

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [PDF]

open access: yes, 2006
Recently Lin et al. proposed a method of using the underdetermined BSS (blind source separation) problem to realize image and speech encryption. In this paper, we give a cryptanalysis of this BSS-based encryption and point out that it is not secure ...
Chen, Guanrong   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy