Results 211 to 220 of about 4,106,080 (244)
Some of the next articles are maybe not open access.
A New Efficient Sbox for Strengthening PRESENT Like Block Ciphers Against Linear Cryptanalysis
2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2019Substitution box(sbox) is the most crucial element in block ciphers like AES, PRESENT etc., in providing good security. Any weakness of sbox will lead to easier retrieval of secret keys.
K. B. Jithendra, T. Shahana
semanticscholar +1 more source
Linear Cryptanalysis: The Idea
2011After differential cryptanalysis, linear cryptanalysis provides the most important general technique for analysing a block cipher. Generally speaking it tends to be far less successful than differential cryptanalysis, the most prominent exception to this rule of thumb being DES; see Chap. 2.
Lars R. Knudsen, Matthew Robshaw
openaire +2 more sources
On linear cryptanalysis of MBAL ciphers
Electronics and Communications in Japan (Part III: Fundamental Electronic Science), 1999This paper studies the linear cryptanalysis of the MBAL (MultiBlock ALgorithm) Cipher. MBAL includes SXAL8 Cipher and 3-round Fm function. Moreover, the size of the input data is variable. In this paper, we propose the strategy of making linear approximations for MBAL which are independent of SXAL8 and the size of the input data.
Kunio Kobayashi, Kazumaro Aoki
openaire +2 more sources
Differential-linear cryptanalysis of SIMON32/64
International Journal of Embedded Systems, 2018Simon is a family of lightweight block ciphers designed by the U.S National Security Agency in 2013. Simon 2n/k is a cipher in this family with k-bit key and 2n-bit block. So far, there have been several cryptanalytic results on this cipher by means of differential cryptanalysis, linear cryptanalysis and impossible differential cryptanalysis.
Yanqin Chen, Wenying Zhang
semanticscholar +2 more sources
Linear cryptanalysis of Baby Rijndael
2015 Forth International Conference on e-Technologies and Networks for Development (ICeND), 2015We present results of linear cryptanalysis of Baby Rijndael, a reduced-size model of Rijndael. The results were obtained using exhaustive search of all approximations and all keys and show some curious properties of both linear cryptanalysis and Baby Rijndael, particularly the existence of different classes of linear approximations with significantly ...
Josef Kokes, Róbert Lórencz
openaire +2 more sources
On Linear Cryptanalysis with Many Linear Approximations
2009In this paper we present a theoretical framework to quantify the information brought by several linear approximations of a block-cipher without putting any restriction on these approximations. We quantify here the entropy of the key given the plaintext-ciphertext pairs statistics which is a much more accurate measure than the ones studied earlier.
Benoît Gérard, Jean-Pierre Tillich
openaire +2 more sources
Quantum linear cryptanalysis on a toy cipher
Pramana (Bangalore), 2023A. Malviya, Namita Tiwari
semanticscholar +1 more source
Differential-Multiple Linear Cryptanalysis
2010Differential-linear cryptanalysis was introduced by Langford et al in 1994. After that, Biham et al proposed an enhanced differential-linear cryptanalysis in 2002. In this paper, we present an extension to the enhanced differential-linear cryptanalysis, called differential-multiple linear cryptanalysis, in which a differential characteristic can be ...
Zhiqiang Liu +3 more
openaire +2 more sources
Differential-Linear Cryptanalysis of ICEPOLE
2015ICEPOLE is a CAESAR candidate with the intermediate level of robustness under nonce misuse circumstances in the original document. In particular, it was claimed that key recovery attack against ICEPOLE is impossible in the case of nonce misuse. ICEPOLE is strong against the differential cryptanalysis and linear cryptanalysis.
Ivan Tjuawinata, Tao Huang, Hongjun Wu
openaire +2 more sources
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
IACR Cryptology ePrint Archive, 2022Sabyasachi Dey +3 more
semanticscholar +1 more source

