Results 21 to 30 of about 721 (175)
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi +3 more
doaj +1 more source
Algebraic Cryptanalysis with MRHS Equations
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis).
Pavol Zajac
doaj +1 more source
Non-Linear Approximations in Linear Cryptanalysis [PDF]
By considering the role of non-linear approximatioris in linear cryptanalysis we obtain a generalization of Matsui's linear cryptanalytic techniques. This approach allows Ihe cryptanalyst greater flexibility in mounting a linear cryptanalytic attack and we demonstrate the effectiveness of our non-linear techniques with some simple attacks on LOK191 ...
Lars R. Knudsen, M. J. B. Robshaw
openaire +1 more source
Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj +1 more source
Linear and differential cryptanalysis: Another viewpoint
Доказаны теоремы о точных значениях линейной и разностной характеристик. Приведен пример универсальной функциональной схемы, который показывает, что обычные методы оценки характеристик вероятностных соотношений могут приводить к значительным ошибкам.
Malyshev, F. M., Trishin, A. E.
openaire +3 more sources
Improved machine learning-aided linear cryptanalysis: application to DES
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou +2 more
doaj +1 more source
Security analysis of an encryption scheme based on nonpositional polynomial notations
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (
Kapalova Nursulu +1 more
doaj +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Machine learning-aided differential-linear attacks with applications to Des and Speck32/64
In CRYPTO 2019, Gohr introduced machine learning-aided differential cryptanalysis, demonstrating superior performance in key-recovery attacks compared to traditional methods. This advancement has sparked significant interest in exploring the potential of
Ze-zhou Hou +2 more
doaj +1 more source
The effectiveness of the linear hull effect
There is no linear hull effect in linear cryptanalysis.
Murphy Sean
doaj +1 more source

