Results 81 to 90 of about 721 (175)

Linear Key-schedule’s Properties of the Smallpresent Block Cipher

open access: yesБезопасность информационных технологий, 2013
SmallPresent block cipher was presented to investigate attacks on the PRESENT block cipher in details. In the paper the resistance to linear cryptanalysis of this cipher with arbitrary linear key-schedule is under consideration.
Georgy Igorevich Khoruzhenko   +1 more
doaj  

Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G

open access: yesIACR Transactions on Symmetric Cryptology
In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one standard algorithm for 5G confidentiality and integrity protection over the wireless channel. SNOW
Yinuo Liu, Jing Yang, Tian Tian
doaj   +1 more source

DIFFERENTIAL AND LINEAR CRYPTOANALYSIS METHODS ELEMENTS FOR ENCRYPTION ALGORITHM BASED ON DYNAMIC CHAOS

open access: yesСистемный анализ и прикладная информатика, 2015
In this paper we assessed the sustainability of the encryption algorithm based on dynamic chaos, as well as the basic principles for the implementation of linear and differential cryptanalysis.
A. V. Sidorenko, L. A. Zhukovets
doaj  

Linear cryptanalysis of 30-round LBC-IoT algorithm

open access: yesTongxin xuebao
In order to evaluate the ability of LBC-IoT algorithm to resist linear cryptanalysis, the set of linear approximations with the longest number of rounds was solved based on the MILP automated search technique using both direct search and iterative linear
Li Lingchen   +3 more
doaj  

Linear Cryptanalysis for Block Ciphers [PDF]

open access: yes, 2006
Biryukov, Alex, De Cannière, Christophe
openaire   +3 more sources

DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption. [PDF]

open access: yesSensors (Basel)
Abdelaal MA   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy