Results 31 to 40 of about 3,190 (199)

On the Security of the Yi-Tan-Siew Chaos-Based Cipher [PDF]

open access: yes, 2004
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break ...
Chen, Guanrong, Li, Shujun, Mou, Xuanqin
core   +2 more sources

The differential fault analysis on block cipher FeW

open access: yesCybersecurity, 2022
Feather weight (FeW) cipher is a lightweight block cipher proposed by Kumar et al. in 2019, which takes 64 bits plaintext as input and produces 64 bits ciphertext. As Kumar et al.
Haiyan Xiao, Lifang Wang, Jinyong Chang
doaj   +1 more source

Extended Generalized Feistel Networks using Matrix Representation [PDF]

open access: yes, 2013
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov   +23 more
core   +3 more sources

Quantum impossible differential and truncated differential cryptanalysis

open access: yes, 2017
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
Xie, Huiqin, Yang, Li
openaire   +2 more sources

Impossible differential cryptanalysis of SPN ciphers

open access: yesIET Information Security, 2011
Impossible differential cryptanalysis is a very popular tool for analysing the security of modern block ciphers and the core of such attack is based on the existence of impossible differentials. Currently, most methods for finding impossible differentials are based on the miss-in-the-middle technique and they are very ad hoc. In this study, the authors
R. Li, B. Sun, C. Li
openaire   +1 more source

New Insights on Impossible Differential Cryptanalysis [PDF]

open access: yes, 2012
Since its introduction, impossible differential cryptanalysis has been applied to many ciphers. Besides the specific application of the technique in various instances, there are some very basic results which apply to generic structures of ciphers, e.g., the well known 5-round impossible differential of Feistel ciphers with bijective round functions.
Charles Bouillaguet   +3 more
openaire   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Improved Cryptanalysis of Reduced-Version QARMA-64/128

open access: yesIEEE Access, 2020
QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future.
Ya Liu   +5 more
doaj   +1 more source

The Impossible Differential Cryptanalysis [PDF]

open access: yes, 2017
V našej diplomovej práci sme sa venovali kryptoanalýze pomocou nemožných diferenciálov ako mierke na testovanie slabín šifier. Kvôli relatívnej novosti, oproti lineárnej a diferenciálnej analýze, nie je táto analýza veľmi známa a existuje len málo ...
Poljak Peter
core  

Quantum differential cryptanalysis to the block ciphers

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +1 more source

Home - About - Disclaimer - Privacy