Results 61 to 70 of about 582 (72)

Algebraic Meet-in-the-Middle Attack on LowMC [PDF]

open access: yes, 2022
By exploiting the feature of partial nonlinear layers, we propose a new technique called algebraic meet-in-the-middle (MITM) attack to analyze the security of LowMC, which can reduce the memory complexity of the simple difference enumeration attack over ...
Fukang Liu   +4 more
openaire   +3 more sources

Implementação em Software da Cifra LowMC

Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022), 2022
Nos últimos anos surgiram várias propostas de primitivas simétricas construídas visando a minimização das operações não lineares, dentre elas, a família de cifras de bloco LowMC. Embora o LowMC seja uma primitiva muito atraente para aplicações que se beneficiam da sua baixa complexidade multiplicativa, o fato dele operar diretamente sobre bits torna-o ...
Roberto Cabral, Julio López
openaire   +1 more source

Improved Quantum Analysis of SPECK and LOWMC

Computer Architecture and Design Methodologies
Anubhab Baksi, Kyungbae Jang
exaly   +2 more sources

A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair

Lecture Notes in Computer Science
Lulu Zhang, Meicheng Liu, Dongdai Lin
exaly   +2 more sources

Differential Power Analysis of the Picnic Signature Scheme [PDF]

open access: yesLecture Notes in Computer Science, 2021
This work introduces the first differential side-channel analysis of the Picnic Signature Scheme, an alternate candidate in the ongoing competition for post-quantum cryptography by the National Institute of Standards and Technology (NIST).
Thomas Eisenbarth
exaly   +2 more sources

Improved Quantum Analysis of SPECK and LowMC

2022
Kyungbae Jang   +4 more
openaire   +1 more source

Improved Quantum Analysis of SPECK and LowMC

Lecture Notes in Computer Science, 2023
Hyunji Kim, Hwajeong Seo
exaly  

Algebraic Meet-in-the-Middle Attack on LowMC

Lecture Notes in Computer Science, 2023
exaly  

FASTA – A Stream Cipher for Fast FHE Evaluation

Lecture Notes in Computer Science, 2022
Carlos Cid, Håvard Raddum
exaly  

The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers

Lecture Notes in Computer Science, 2020
Thomas Peyrin
exaly  

Home - About - Disclaimer - Privacy