Results 11 to 20 of about 144 (105)
Multidimensional zero‐correlation linear cryptanalysis of the block cipher KASUMI [PDF]
The block cipher KASUMI, proposed by ETSI SAGE over 10 years ago, is widely used for security in many synchronous wireless standards nowadays. For instance, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI.
Yi, Wentan, Chen, Shaozhen
+6 more sources
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation [PDF]
The decorrelation theory provides a different point of view on the security of block cipher primitives. Results on some statistical attacks obtained in this context can support or provide new insight on the security of symmetric cryptographic primitives.
Céline Blondeau +2 more
+8 more sources
This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions.
Betül Aşkın Özdemir, Vincent Rijmen
doaj +3 more sources
Multidimensional zero‐correlation linear cryptanalysis of lightweight block cipher Piccolo‐128 [PDF]
AbstractPiccolo is a lightweight block cipher proposed at CHES 2011. This paper firstly gives the zero‐correlation linear approximations over 7‐round Piccolo and studies the security of Piccolo‐128 against multidimensional zero‐correlation linear cryptanalysis. Based on the statistic used in multidimensional linear cryptanalysis to detect the right key
Li‐shi Fu +2 more
openaire +2 more sources
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent [PDF]
In this paper, we present a new technique for Matsui's algorithm 2 using multidimensional linear approximation. We show that the data complexity of the attack can be reduced significantly by our method even when the linear hull effect is present. We apply our method to the key recovery attack on 5-round Serpent and demonstrate that our attack is ...
Joo Yeon Cho +2 more
openaire +2 more sources
A Systematic and Meta-Analysis Survey of Whale Optimization Algorithm. [PDF]
The whale optimization algorithm (WOA) is a nature‐inspired metaheuristic optimization algorithm, which was proposed by Mirjalili and Lewis in 2016. This algorithm has shown its ability to solve many problems. Comprehensive surveys have been conducted about some other nature‐inspired algorithms, such as ABC and PSO.
Mohammed HM, Umar SU, Rashid TA.
europepmc +2 more sources
Improved linear cryptanalysis on 25‐round SMS4
Abstract SMS4 is the Chinese national standard for WLAN, which is also an ISO/IEC international standard. This paper presents a linear cryptanalysis on 25‐round SMS4 for the first time. Firstly, this paper adopts a new statistic in linear cryptanalysis, which is aimed to compute the distance between one cipher system and one random permutation, which ...
Lishi Fu, Chenhui Jin
wiley +1 more source
Many cryptanalytic techniques for symmetric‐key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext‐ciphertext pairs. For example, there is a standard statistical model for differential cryptanalysis that determines the success probability and complexity of the attack
Caibing WANG +3 more
wiley +1 more source
A Blockchain‐Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
Adding the adequate level of security of information systems dealing with sensitive data, privacy, or defense systems involves some form of access control. The audits performed are dealing with the determination of the allowed activities of the legal users, when attempting to access resources of the system.
Xinlong LI, Konstantinos Demertzis
wiley +1 more source
[Retracted] Deep Learning‐Based English‐Chinese Translation Research
Neural machine translation (NMT) has been bringing exciting news in the field of machine translation since its emergence. However, because NMT only employs single neural networks to convert natural languages, it suffers from two drawbacks in terms of reducing translation time: NMT is more sensitive to sentence length than statistical machine ...
Yao Huang, Yi Xin, Victor S. Sheng
wiley +1 more source

