Results 31 to 40 of about 12,474 (214)
New Security Proofs and Complexity Records for Advanced Encryption Standard
Common block ciphers like AES specified by the NIST or KASUMI (A5/3) of GSM are extensively utilized by billions of individuals globally to protect their privacy and maintain confidentiality in daily communications.
Orhun Kara
doaj +1 more source
Subspace Trail Cryptanalysis and its Applications to AES
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi +2 more
doaj +1 more source
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle +12 more
core +2 more sources
Cryptanalysis of Reduced-Round SPECK
SPECK, a family of lightweight block ciphers proposed by the National Security Agency (NSA), is widely used under resource constrained environment. There are many cryptanalytic results on SPECK concentrated on differential and linear attacks.
Jiongjiong Ren, Shaozhen Chen
doaj +1 more source
New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA [PDF]
Congress on Evolutionary Computation. Portland, USA, 19-23 June 2004Recently, a simple way of creating very efficient distinguishers for cryptographic primitives such as block ciphers or hash functions, was presented by the authors.
Hernández, Julio C., Isasi, Pedro
core +4 more sources
Cryptanalysis of Reduced round SKINNY Block Cipher
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi +2 more
doaj +1 more source
In this paper, a new method for evaluating the integral property, truncated and impossible differentials for substitution-permutation network (SPN) block ciphers is proposed. The main assumption is an explicit description/expression of the internal state
Wenying Zhang +3 more
doaj +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [PDF]
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named "Multimedia Cryptography System" (MCS). No cryptanalytic results have been reported so far. This paper presents a differential attack to break MCS, which
Kyamakya, Kyandoghere +3 more
core +1 more source
The differential fault analysis on block cipher FeW
Feather weight (FeW) cipher is a lightweight block cipher proposed by Kumar et al. in 2019, which takes 64 bits plaintext as input and produces 64 bits ciphertext. As Kumar et al.
Haiyan Xiao, Lifang Wang, Jinyong Chang
doaj +1 more source

