Results 21 to 30 of about 721 (175)

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +3 more
doaj   +1 more source

Algebraic Cryptanalysis with MRHS Equations

open access: yesCryptography, 2023
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis).
Pavol Zajac
doaj   +1 more source

Non-Linear Approximations in Linear Cryptanalysis [PDF]

open access: yes, 1996
By considering the role of non-linear approximatioris in linear cryptanalysis we obtain a generalization of Matsui's linear cryptanalytic techniques. This approach allows Ihe cryptanalyst greater flexibility in mounting a linear cryptanalytic attack and we demonstrate the effectiveness of our non-linear techniques with some simple attacks on LOK191 ...
Lars R. Knudsen, M. J. B. Robshaw
openaire   +1 more source

Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)

open access: yesJurnal Matematika, 2016
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj   +1 more source

Linear and differential cryptanalysis: Another viewpoint

open access: yesМатематические вопросы криптографии, 2020
Доказаны теоремы о точных значениях линейной и разностной характеристик. Приведен пример универсальной функциональной схемы, который показывает, что обычные методы оценки характеристик вероятностных соотношений могут приводить к значительным ошибкам.
Malyshev, F. M., Trishin, A. E.
openaire   +3 more sources

Improved machine learning-aided linear cryptanalysis: application to DES

open access: yesCybersecurity
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis.
Zezhou Hou   +2 more
doaj   +1 more source

Security analysis of an encryption scheme based on nonpositional polynomial notations

open access: yesOpen Engineering, 2016
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (
Kapalova Nursulu   +1 more
doaj   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Machine learning-aided differential-linear attacks with applications to Des and Speck32/64

open access: yesJournal of King Saud University: Computer and Information Sciences
In CRYPTO 2019, Gohr introduced machine learning-aided differential cryptanalysis, demonstrating superior performance in key-recovery attacks compared to traditional methods. This advancement has sparked significant interest in exploring the potential of
Ze-zhou Hou   +2 more
doaj   +1 more source

The effectiveness of the linear hull effect

open access: yesJournal of Mathematical Cryptology, 2012
There is no linear hull effect in linear cryptanalysis.
Murphy Sean
doaj   +1 more source

Home - About - Disclaimer - Privacy