Results 1 to 10 of about 721 (175)

Multiple Linear Cryptanalysis Using Linear Statistics

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We propose an improved and extended approach of the multiple linear cryptanalysis presented by A. Biryukov et al. at CRYPTO 2004 that exploits dominant and statistically independent linear trails. While they presented only rank based attacks with success
Jung-Keun Lee, Woo-Hwan Kim
doaj   +2 more sources

Quantum Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2016
Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities.
Marc Kaplan   +3 more
doaj   +7 more sources

Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited [PDF]

open access: yesEntropy, 2023
With the development of artificial intelligence, deep-learning-based cryptanalysis has been actively studied. There are many cryptanalysis techniques.
Hyunji Kim   +6 more
doaj   +2 more sources

Multidimensional Linear Cryptanalysis of AEGIS

open access: yesIACR Transactions on Symmetric Cryptology
AEGIS is a family of authenticated encryption with associated data (AEAD) ciphers that target for highly efficient implementations in software. The main operation in AEGIS is the AES encryption round function such that it can make full use of the ...
Yinuo Liu, Tian Tian, Jing Yang
doaj   +2 more sources

Differential-linear cryptanalysis of PRINCE cipher

open access: yes网络与信息安全学报, 2021
PRINCE is a low-latency lightweight block cipher, which is widely used in a lot of resource constrained devices. It is based on the FX construction and the core component is PRINCEcore.
LIU Zhengbin
doaj   +3 more sources

Multidimensional Linear Cryptanalysis [PDF]

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hermelin, Miia   +2 more
openaire   +3 more sources

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (232)) and High Irreducible Polynomials

open access: yesApplied Sciences, 2023
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine   +1 more
doaj   +1 more source

Rotational Differential-Linear Cryptanalysis Revisited

open access: yesJournal of Cryptology, 2022
AbstractThe differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with ...
Liu, Yunwen   +4 more
openaire   +2 more sources

On Multidimensional Linear Cryptanalysis [PDF]

open access: yes, 2010
Matsui's Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO'04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP'08, a different approach was taken by studying m-dimensional combined approximations from m base approximations ...
Nguyen, Phuong Ha   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy