Results 181 to 190 of about 1,200 (193)
Some of the next articles are maybe not open access.
Differential-Multiple Linear Cryptanalysis
2010Differential-linear cryptanalysis was introduced by Langford et al in 1994. After that, Biham et al proposed an enhanced differential-linear cryptanalysis in 2002. In this paper, we present an extension to the enhanced differential-linear cryptanalysis, called differential-multiple linear cryptanalysis, in which a differential characteristic can be ...
Zhiqiang Liu +3 more
openaire +1 more source
Linear cryptanalysis of Baby Rijndael
2015 Forth International Conference on e-Technologies and Networks for Development (ICeND), 2015We present results of linear cryptanalysis of Baby Rijndael, a reduced-size model of Rijndael. The results were obtained using exhaustive search of all approximations and all keys and show some curious properties of both linear cryptanalysis and Baby Rijndael, particularly the existence of different classes of linear approximations with significantly ...
Josef Kokes, Robert Lorencz
openaire +1 more source
New insights on linear cryptanalysis
Science China Information Sciences, 2019Linear cryptanalysis is one of the most important cryptanalytic tools against block ciphers, thus modern block ciphers are always deliberately devised to avoid good long linear characteristics so as to resist linear cryptanalysis and its extensions.
Zhiqiang Liu +5 more
openaire +1 more source
On Linear Cryptanalysis with Many Linear Approximations
2009In this paper we present a theoretical framework to quantify the information brought by several linear approximations of a block-cipher without putting any restriction on these approximations. We quantify here the entropy of the key given the plaintext-ciphertext pairs statistics which is a much more accurate measure than the ones studied earlier.
Benoît Gérard, Jean-Pierre Tillich
openaire +1 more source
Differential-Linear Cryptanalysis of ICEPOLE
2015ICEPOLE is a CAESAR candidate with the intermediate level of robustness under nonce misuse circumstances in the original document. In particular, it was claimed that key recovery attack against ICEPOLE is impossible in the case of nonce misuse. ICEPOLE is strong against the differential cryptanalysis and linear cryptanalysis.
Tao Huang, Ivan Tjuawinata, Hongjun Wu
openaire +1 more source
2020
11 Abstract To keep messages secure in communications, certain transformations (en cryptions) are applied that are reversible in the knowledge of a key. These transformations transform the data into an unintelligible form that becomes intelligible only after reverse transformation is applied. Block ciphers are a common way of encryption.
openaire +1 more source
11 Abstract To keep messages secure in communications, certain transformations (en cryptions) are applied that are reversible in the knowledge of a key. These transformations transform the data into an unintelligible form that becomes intelligible only after reverse transformation is applied. Block ciphers are a common way of encryption.
openaire +1 more source
Differential-Linear Cryptanalysis of Camellia
2006Camellia is the final selection of 128-bit block cipher in NESSIE. In this paper, we present differential-linear cryptanalysis of modified camellia reduced to 9 and 10 rounds. For modified camellia with 9 rounds we can find the user key with 2 14 chosen plaintexts and 2 185.5 encryptions and for modified camellia with 10 rounds we can find the user key
Wenling Wu, Dengguo Feng
openaire +1 more source

