Results 41 to 50 of about 4,106,080 (244)
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +8 more sources
Security Analysis of Lightweight IoT Cipher: Chaskey
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree search based heuristic approach. ARX algorithms are suitable for resource-constrained devices such as IoT and very resistant to standard cryptanalysis such as ...
Ashutosh Dhar Dwivedi
doaj +1 more source
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of symmetric-key primitives. For differential and linear cryptanalysis, MILP can be used to solve two kinds of problems: calculation of the minimum number of ...
Chunning Zhou +3 more
semanticscholar +1 more source
Nonlinear Approximations in Cryptanalysis Revisited
This work studies deterministic and non-deterministic nonlinear approximations for cryptanalysis of block ciphers and cryptographic permutations and embeds it into the well-understood framework of linear cryptanalysis.
Christof Beierle +2 more
doaj +1 more source
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources
Algebraic Cryptanalysis with MRHS Equations
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis).
Pavol Zajac
doaj +1 more source
Differential-Linear Cryptanalysis [PDF]
This paper introduces a new chosen text attack on iterated cryptosystems, such as the Data Encryption Standard (DES). The attack is very efficient for 8-round DES,2 recovering 10 bits of key with 80% probability of success using only 512 chosen plaintexts. The probability of success increases to 95% using 768 chosen plaintexts.
Martin E. Hellman, Susan K. Langford
openaire +2 more sources
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai +3 more
doaj +1 more source
Wave-Shaped Round Functions and Primitive Groups [PDF]
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo +4 more
core +2 more sources
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32 second-round candidates in NIST’s lightweight cryptography standardization process. TinyJAMBU adopts an NLFSR based keyed-permutation that computes only a single
Dhiman Saha +5 more
semanticscholar +1 more source

