Results 1 to 10 of about 32 (28)

Application of Differential Evolution Algorithm in the Construction and Simulation of Interactive English Translation Teaching Mode

open access: yesAdvances in Multimedia, 2022
To improve the effect of English translation teaching, this paper combines the differential evolution algorithm to construct and simulate the interactive English translation teaching mode and analyzes the differential enumeration attack.
Chi Che
doaj   +2 more sources

MRHS solver based on linear algebra and exhaustive search

open access: yesJournal of Mathematical Cryptology, 2018
We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher’s resistance against algebraic attacks.
Raddum Håvard, Zajac Pavol
doaj   +2 more sources

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu   +3 more
doaj   +3 more sources

Effect of the difference enumeration attack on LowMC instances

open access: yes网络与信息安全学报, 2021
The LowMC is an algorithm with low multiplicative complexities.For the parameter with limited data complexities and low number of S-boxes, the difference enumeration attack was proposed, which could theoretically attack all rounds of the LowMC ...
Xinxin GE, Zhihu LI, Meiqin WANG, Kai HU
doaj   +3 more sources

Improved Attacks on LowMC with Algebraic Techniques

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj   +1 more source

Differential Fault Attacks on Privacy Protocols Friendly Symmetric‐Key Primitives: RAIN and HERA

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
As the practical applications of fully homomorphic encryption (FHE), secure multi‐party computation (MPC) and zero‐knowledge (ZK) proof continue to increase, so does the need to design and analyze new symmetric‐key primitives that can adapt to these privacy‐preserving protocols.
Lin Jiao   +4 more
wiley   +1 more source

Improving MPCitH with Preprocessing: Mask Is All You Need

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The MPC-in-the-head with preprocessing (MPCitH-PP) paradigm presents a novel approach for constructing post-quantum digital signatures like Picnic3.
Guowei Liu   +6 more
doaj   +1 more source
Some of the next articles are maybe not open access.

New cryptanalysis of LowMC with algebraic techniques

Designs, Codes, and Cryptography, 2023
Hailun Yan
exaly  

Home - About - Disclaimer - Privacy