Results 221 to 230 of about 4,106,080 (244)
Some of the next articles are maybe not open access.
Quantum zero correlation linear cryptanalysis
Quantum Information Processing, 2022Rui Shi +4 more
semanticscholar +1 more source
Linear cryptanalysis of LOKI and s 2DES
1995This paper discusses linear cryptanalysis of LOKI89, LOKI91 and s2DES. Our computer program based on Matsui's search algorithm has completely determined their best linear approximate equations, which tell us applicability of linear cryptanalysis to each cryptosystem.
Tohru Sorimachi +2 more
openaire +2 more sources
Linear Cryptanalysis of FF3-1 and FEA
IACR Cryptology ePrint Archive, 2021Tim Beyne
semanticscholar +1 more source
The piling-up approximation in linear cryptanalysis
IEEE Transactions on Information Theory, 2001Summary: One of the key identities in linear cryptanalysis is the piling-up lemma, which allows one to compute the probability distribution of a sum modulo 2 of binary random variables, when the probability that these are zero is known. However, the lemma holds only for independent random variables.
openaire +2 more sources
Differential-Linear Cryptanalysis from an Algebraic Perspective
Annual International Cryptology Conference, 2021Meicheng Liu, Xiaojuan Lu, D. Lin
semanticscholar +1 more source
On Bias Estimation in Linear Cryptanalysis
2000Security analysis of block ciphers against linear cryptanalysis has virtually always been based on the bias estimates obtained by the Piling-Up Lemma (PUL) method. Despite its common use, and despite the fact that the independence assumption of the PUL is known not to hold in practice, accuracy of the PUL method has not been analyzed to date.
openaire +2 more sources
An FPGA Implementation of the Linear Cryptanalysis
2002Thispa per dealsw ith cryptographic concepts. It presents a hardware FPGA implementation of linear cryptanalysis of DES1. Linear cryptanalysis is the best attack known able to break DES faster than exhaustive search. Matsui's original attack [4, 5] could not be applied as such, and we had to implement a modified attack [1] to face hardware constraints.
François Koeune +5 more
openaire +2 more sources
A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS
Cryptologia, 2002In this paper, we present a detailed tutorial on linear cryptanalysis and differential cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The intent of the paper is to present a lucid explanation of the attacks, detailing the practical application of the attacks to a cipher in a simple, conceptually revealing ...
openaire +2 more sources
On applying linear cryptanalysis to IDEA
1996Linear cryptanalysis is a well-known attack based on linear approximations, and is said to be feasible for an n-bit block cipher if the data complexity is at most 2n. In this paper we consider IDEA with independent and uniformly distributed subkeys, referred to as IDEA with extended subkeys.
Luke O'Connor, Philip Hawkes
openaire +2 more sources

