Results 1 to 10 of about 721 (175)
Multiple Linear Cryptanalysis Using Linear Statistics
We propose an improved and extended approach of the multiple linear cryptanalysis presented by A. Biryukov et al. at CRYPTO 2004 that exploits dominant and statistically independent linear trails. While they presented only rank based attacks with success
Jung-Keun Lee, Woo-Hwan Kim
doaj +2 more sources
Quantum Differential and Linear Cryptanalysis
Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities.
Marc Kaplan +3 more
doaj +7 more sources
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited [PDF]
With the development of artificial intelligence, deep-learning-based cryptanalysis has been actively studied. There are many cryptanalysis techniques.
Hyunji Kim +6 more
doaj +2 more sources
Multidimensional Linear Cryptanalysis of AEGIS
AEGIS is a family of authenticated encryption with associated data (AEAD) ciphers that target for highly efficient implementations in software. The main operation in AEGIS is the AES encryption round function such that it can make full use of the ...
Yinuo Liu, Tian Tian, Jing Yang
doaj +2 more sources
Differential-linear cryptanalysis of PRINCE cipher
PRINCE is a low-latency lightweight block cipher, which is widely used in a lot of resource constrained devices. It is based on the FX construction and the core component is PRINCEcore.
LIU Zhengbin
doaj +3 more sources
Multidimensional Linear Cryptanalysis [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hermelin, Miia +2 more
openaire +3 more sources
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj +1 more source
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine +1 more
doaj +1 more source
Rotational Differential-Linear Cryptanalysis Revisited
AbstractThe differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with ...
Liu, Yunwen +4 more
openaire +2 more sources
On Multidimensional Linear Cryptanalysis [PDF]
Matsui's Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO'04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP'08, a different approach was taken by studying m-dimensional combined approximations from m base approximations ...
Nguyen, Phuong Ha +3 more
openaire +2 more sources

