Results 11 to 20 of about 144 (105)

Multidimensional zero‐correlation linear cryptanalysis of the block cipher KASUMI [PDF]

open access: greenIET Information Security, 2016
The block cipher KASUMI, proposed by ETSI SAGE over 10 years ago, is widely used for security in many synchronous wireless standards nowadays. For instance, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI.
Yi, Wentan, Chen, Shaozhen
  +6 more sources

Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation [PDF]

open access: green, 2015
The decorrelation theory provides a different point of view on the security of block cipher primitives. Results on some statistical attacks obtained in this context can support or provide new insight on the security of symmetric cryptographic primitives.
Céline Blondeau   +2 more
  +8 more sources

Analysis of Diffusion Properties in Generalized Feistel Ciphers Under Multidimensional Linear Cryptanalysis

open access: diamondIACR Transactions on Symmetric Cryptology
This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions.
Betül Aşkın Özdemir, Vincent Rijmen
doaj   +3 more sources

Multidimensional zero‐correlation linear cryptanalysis of lightweight block cipher Piccolo‐128 [PDF]

open access: closedSecurity and Communication Networks, 2016
AbstractPiccolo is a lightweight block cipher proposed at CHES 2011. This paper firstly gives the zero‐correlation linear approximations over 7‐round Piccolo and studies the security of Piccolo‐128 against multidimensional zero‐correlation linear cryptanalysis. Based on the statistic used in multidimensional linear cryptanalysis to detect the right key
Li‐shi Fu   +2 more
openaire   +2 more sources

A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent [PDF]

open access: closed, 2009
In this paper, we present a new technique for Matsui's algorithm 2 using multidimensional linear approximation. We show that the data complexity of the attack can be reduced significantly by our method even when the linear hull effect is present. We apply our method to the key recovery attack on 5-round Serpent and demonstrate that our attack is ...
Joo Yeon Cho   +2 more
openaire   +2 more sources

A Systematic and Meta-Analysis Survey of Whale Optimization Algorithm. [PDF]

open access: yesComput Intell Neurosci, 2019
The whale optimization algorithm (WOA) is a nature‐inspired metaheuristic optimization algorithm, which was proposed by Mirjalili and Lewis in 2016. This algorithm has shown its ability to solve many problems. Comprehensive surveys have been conducted about some other nature‐inspired algorithms, such as ABC and PSO.
Mohammed HM, Umar SU, Rashid TA.
europepmc   +2 more sources

Improved linear cryptanalysis on 25‐round SMS4

open access: yesIET Communications, Volume 16, Issue 14, Page 1643-1653, August 2022., 2022
Abstract SMS4 is the Chinese national standard for WLAN, which is also an ISO/IEC international standard. This paper presents a linear cryptanalysis on 25‐round SMS4 for the first time. Firstly, this paper adopts a new statistic in linear cryptanalysis, which is aimed to compute the distance between one cipher system and one random permutation, which ...
Lishi Fu, Chenhui Jin
wiley   +1 more source

Statistical Model on CRAFT

open access: yesChinese Journal of Electronics, Volume 31, Issue 4, Page 698-712, July 2022., 2022
Many cryptanalytic techniques for symmetric‐key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext‐ciphertext pairs. For example, there is a standard statistical model for differential cryptanalysis that determines the success probability and complexity of the attack
Caibing WANG   +3 more
wiley   +1 more source

A Blockchain‐Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage

open access: yesComputational Intelligence and Neuroscience, Volume 2022, Issue 1, 2022., 2022
Adding the adequate level of security of information systems dealing with sensitive data, privacy, or defense systems involves some form of access control. The audits performed are dealing with the determination of the allowed activities of the legal users, when attempting to access resources of the system.
Xinlong LI, Konstantinos Demertzis
wiley   +1 more source

[Retracted] Deep Learning‐Based English‐Chinese Translation Research

open access: yesAdvances in Meteorology, Volume 2022, Issue 1, 2022., 2022
Neural machine translation (NMT) has been bringing exciting news in the field of machine translation since its emergence. However, because NMT only employs single neural networks to convert natural languages, it suffers from two drawbacks in terms of reducing translation time: NMT is more sensitive to sentence length than statistical machine ...
Yao Huang, Yi Xin, Victor S. Sheng
wiley   +1 more source

Home - About - Disclaimer - Privacy