Results 211 to 220 of about 4,106,080 (244)
Some of the next articles are maybe not open access.

A New Efficient Sbox for Strengthening PRESENT Like Block Ciphers Against Linear Cryptanalysis

2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2019
Substitution box(sbox) is the most crucial element in block ciphers like AES, PRESENT etc., in providing good security. Any weakness of sbox will lead to easier retrieval of secret keys.
K. B. Jithendra, T. Shahana
semanticscholar   +1 more source

Linear Cryptanalysis: The Idea

2011
After differential cryptanalysis, linear cryptanalysis provides the most important general technique for analysing a block cipher. Generally speaking it tends to be far less successful than differential cryptanalysis, the most prominent exception to this rule of thumb being DES; see Chap. 2.
Lars R. Knudsen, Matthew Robshaw
openaire   +2 more sources

On linear cryptanalysis of MBAL ciphers

Electronics and Communications in Japan (Part III: Fundamental Electronic Science), 1999
This paper studies the linear cryptanalysis of the MBAL (MultiBlock ALgorithm) Cipher. MBAL includes SXAL8 Cipher and 3-round Fm function. Moreover, the size of the input data is variable. In this paper, we propose the strategy of making linear approximations for MBAL which are independent of SXAL8 and the size of the input data.
Kunio Kobayashi, Kazumaro Aoki
openaire   +2 more sources

Differential-linear cryptanalysis of SIMON32/64

International Journal of Embedded Systems, 2018
Simon is a family of lightweight block ciphers designed by the U.S National Security Agency in 2013. Simon 2n/k is a cipher in this family with k-bit key and 2n-bit block. So far, there have been several cryptanalytic results on this cipher by means of differential cryptanalysis, linear cryptanalysis and impossible differential cryptanalysis.
Yanqin Chen, Wenying Zhang
semanticscholar   +2 more sources

Linear cryptanalysis of Baby Rijndael

2015 Forth International Conference on e-Technologies and Networks for Development (ICeND), 2015
We present results of linear cryptanalysis of Baby Rijndael, a reduced-size model of Rijndael. The results were obtained using exhaustive search of all approximations and all keys and show some curious properties of both linear cryptanalysis and Baby Rijndael, particularly the existence of different classes of linear approximations with significantly ...
Josef Kokes, Róbert Lórencz
openaire   +2 more sources

On Linear Cryptanalysis with Many Linear Approximations

2009
In this paper we present a theoretical framework to quantify the information brought by several linear approximations of a block-cipher without putting any restriction on these approximations. We quantify here the entropy of the key given the plaintext-ciphertext pairs statistics which is a much more accurate measure than the ones studied earlier.
Benoît Gérard, Jean-Pierre Tillich
openaire   +2 more sources

Quantum linear cryptanalysis on a toy cipher

Pramana (Bangalore), 2023
A. Malviya, Namita Tiwari
semanticscholar   +1 more source

Differential-Multiple Linear Cryptanalysis

2010
Differential-linear cryptanalysis was introduced by Langford et al in 1994. After that, Biham et al proposed an enhanced differential-linear cryptanalysis in 2002. In this paper, we present an extension to the enhanced differential-linear cryptanalysis, called differential-multiple linear cryptanalysis, in which a differential characteristic can be ...
Zhiqiang Liu   +3 more
openaire   +2 more sources

Differential-Linear Cryptanalysis of ICEPOLE

2015
ICEPOLE is a CAESAR candidate with the intermediate level of robustness under nonce misuse circumstances in the original document. In particular, it was claimed that key recovery attack against ICEPOLE is impossible in the case of nonce misuse. ICEPOLE is strong against the differential cryptanalysis and linear cryptanalysis.
Ivan Tjuawinata, Tao Huang, Hongjun Wu
openaire   +2 more sources

Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha

IACR Cryptology ePrint Archive, 2022
Sabyasachi Dey   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy