Results 221 to 230 of about 4,106,080 (244)
Some of the next articles are maybe not open access.

Quantum zero correlation linear cryptanalysis

Quantum Information Processing, 2022
Rui Shi   +4 more
semanticscholar   +1 more source

Linear cryptanalysis of LOKI and s 2DES

1995
This paper discusses linear cryptanalysis of LOKI89, LOKI91 and s2DES. Our computer program based on Matsui's search algorithm has completely determined their best linear approximate equations, which tell us applicability of linear cryptanalysis to each cryptosystem.
Tohru Sorimachi   +2 more
openaire   +2 more sources

Linear Cryptanalysis of FF3-1 and FEA

IACR Cryptology ePrint Archive, 2021
Tim Beyne
semanticscholar   +1 more source

The piling-up approximation in linear cryptanalysis

IEEE Transactions on Information Theory, 2001
Summary: One of the key identities in linear cryptanalysis is the piling-up lemma, which allows one to compute the probability distribution of a sum modulo 2 of binary random variables, when the probability that these are zero is known. However, the lemma holds only for independent random variables.
openaire   +2 more sources

Differential-Linear Cryptanalysis from an Algebraic Perspective

Annual International Cryptology Conference, 2021
Meicheng Liu, Xiaojuan Lu, D. Lin
semanticscholar   +1 more source

On Bias Estimation in Linear Cryptanalysis

2000
Security analysis of block ciphers against linear cryptanalysis has virtually always been based on the bias estimates obtained by the Piling-Up Lemma (PUL) method. Despite its common use, and despite the fact that the independence assumption of the PUL is known not to hold in practice, accuracy of the PUL method has not been analyzed to date.
openaire   +2 more sources

An FPGA Implementation of the Linear Cryptanalysis

2002
Thispa per dealsw ith cryptographic concepts. It presents a hardware FPGA implementation of linear cryptanalysis of DES1. Linear cryptanalysis is the best attack known able to break DES faster than exhaustive search. Matsui's original attack [4, 5] could not be applied as such, and we had to implement a modified attack [1] to face hardware constraints.
François Koeune   +5 more
openaire   +2 more sources

A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS

Cryptologia, 2002
In this paper, we present a detailed tutorial on linear cryptanalysis and differential cryptanalysis, the two most significant attacks applicable to symmetric-key block ciphers. The intent of the paper is to present a lucid explanation of the attacks, detailing the practical application of the attacks to a cipher in a simple, conceptually revealing ...
openaire   +2 more sources

Linear Cryptanalysis

2023
Nyberg, Kaisa, Florez Gutierrez, Antonio
openaire   +1 more source

On applying linear cryptanalysis to IDEA

1996
Linear cryptanalysis is a well-known attack based on linear approximations, and is said to be feasible for an n-bit block cipher if the data complexity is at most 2n. In this paper we consider IDEA with independent and uniformly distributed subkeys, referred to as IDEA with extended subkeys.
Luke O'Connor, Philip Hawkes
openaire   +2 more sources

Home - About - Disclaimer - Privacy