Results 51 to 60 of about 4,106,080 (244)

Cryptanalysis of three matrix-based key establishment protocols [PDF]

open access: yes, 2011
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to ...
Blackburn, Simon R.   +2 more
core   +4 more sources

The complexity of MinRank [PDF]

open access: yes, 2019
In this note, we leverage some of our results from arXiv:1706.06319 to produce a concise and rigorous proof for the complexity of the generalized MinRank Problem in the under-defined and well-defined case.
Caminata, Alessio, Gorla, Elisa
core   +2 more sources

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +3 more
doaj   +1 more source

Converting of Boolean Expression to Linear Equations, Inequalities and QUBO Penalties for Cryptanalysis

open access: yesAlgorithms, 2022
There exists a wide range of constraint programming (CP) problems defined on Boolean functions depending on binary variables. One of the approaches to solving CP problems is using specific appropriate solvers, e.g., SAT solvers.
A. I. Pakhomchik   +3 more
semanticscholar   +1 more source

Linear Cryptanalysis of RC5 and RC6 [PDF]

open access: yes, 1999
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We describe a known plaintext attack that can break RC5-32 (blocksize 64) with 10 rounds and RC5-64 (block-size 128) with 15 rounds. In order to do this we use techniques related to the use of multiple linear approximations.
Borst, Johan   +2 more
openaire   +2 more sources

Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)

open access: yesJurnal Matematika, 2016
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj   +1 more source

Algebraic Techniques in Linear Cryptanalysis

open access: yesProceedings of the 2012 2nd International Conference on Computer and Information Applications (ICCIA 2012), 2012
Linear cryptanalysis is a statistical analysis method. Linear cryptanalysis constructs probabilistic patterns first and then distinguishes the cipher from a random permutation using lots of plaintext-ciphertext pairs. Linear cryptanalysis has a big data complexity. Algebraic attack attempts to exploit the algebraic structure of the cipher by expressing
Ya Fei Zheng, Hong Ru Wei
openaire   +4 more sources

Security analysis of an encryption scheme based on nonpositional polynomial notations

open access: yesOpen Engineering, 2016
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (
Kapalova Nursulu   +1 more
doaj   +1 more source

Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers

open access: yesIACR Commun. Cryptol.
At CHES 2017, Banik et al. proposed a lightweight block cipher GIFT consisting of two versions GIFT-64 and GIFT-128. Recently, there are lots of authenticated encryption schemes that adopt GIFT-128 as their underlying primitive, such as GIFT-COFB and ...
Shichang Wang   +3 more
semanticscholar   +1 more source

Non-Linear Approximations in Linear Cryptanalysis [PDF]

open access: yes, 1996
By considering the role of non-linear approximatioris in linear cryptanalysis we obtain a generalization of Matsui's linear cryptanalytic techniques. This approach allows Ihe cryptanalyst greater flexibility in mounting a linear cryptanalytic attack and we demonstrate the effectiveness of our non-linear techniques with some simple attacks on LOK191 ...
Matthew Robshaw, Lars R. Knudsen
openaire   +2 more sources

Home - About - Disclaimer - Privacy