Results 1 to 10 of about 389,362 (239)

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin   +4 more
doaj   +1 more source

New Key-Recovery Attack on Reduced-Round AES

open access: yesIACR Transactions on Symmetric Cryptology, 2022
A new fundamental 4-round property of AES, called the zero-difference property, was introduced by Rønjom, Bardeh and Helleseth at Asiacrypt 2017.
Navid Ghaedi Bardeh, Vincent Rijmen
doaj   +1 more source

Quantum key recovery attack on SIMON32/64

open access: yesCybersecurity, 2021
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while the quantum attacks combined with classical ...
Hui Liu, Li Yang
doaj   +1 more source

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
doaj   +1 more source

A Key-Recovery Side-Channel Attack on Classic McEliece Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.
Qian Guo   +2 more
doaj   +3 more sources

Improved integral attack——random linear distinguish and key recovery attack

open access: yesTongxin xuebao, 2023
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj   +2 more sources

Lattice Attacks on NTRU Revisited

open access: yesIEEE Access, 2021
NTRU cryptosystem was proposed by J. Hoffstein, J.Pipher and J.H. Silverman in 1996, whose security is related to the hardness of finding sufficient short vectors in NTRU lattice with dimension $2N$ .
Jingguo Bi, Lidong Han
doaj   +1 more source

Extracting the Secrets of OpenSSL with RAMBleed

open access: yesSensors, 2022
Concomitant with the increasing density of semiconductors, various attacks that threaten the integrity and security of dynamic random access memory (DRAM) have been devised.
Chihiro Tomita   +5 more
doaj   +1 more source

Practical Key-Recovery Attack on MANTIS5

open access: yesIACR Transactions on Symmetric Cryptology, 2017
MANTIS is a lightweight tweakable block cipher published at CRYPTO 2016. In addition to the full 14-round version, MANTIS7, the designers also propose an aggressive 10-round version, MANTIS5.
Christoph Dobraunig   +3 more
doaj   +1 more source

Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

open access: yesIACR Transactions on Symmetric Cryptology, 2021
When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cryptanalysis and the linear trails in the linear cryptanalysis.
Rui Zong   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy