Results 21 to 30 of about 1,018 (121)

Zero‐Correlation Linear Cryptanalysis on SPARX‐64

open access: yesJournal of Sensors, Volume 2021, Issue 1, 2021., 2021
SPARX is a family of ARX‐based block ciphers designed according to the long‐trail strategy, which has 32‐bit ARX‐based SBoxes and has provable bounds against single‐differential and single‐linear cryptanalysis. Since its proposation, some third‐party cryptanalysis methods have been presented. As far as we know, the best attacks against SPARX‐64 covered
Dawei Zhou   +4 more
wiley   +1 more source

On Multidimensional Linear Cryptanalysis [PDF]

open access: yes, 2010
Matsui's Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO'04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP'08, a different approach was taken by studying m-dimensional combined approximations from m base approximations ...
Nguyen, Phuong Ha   +3 more
openaire   +2 more sources

Computational Image Encryption Techniques: A Comprehensive Review

open access: yesMathematical Problems in Engineering, Volume 2021, Issue 1, 2021., 2021
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote‐sensing, and medical‐imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification.
Mandeep Kaur   +3 more
wiley   +1 more source

Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design

open access: yesAdvances in Mathematical Physics, Volume 2021, Issue 1, 2021., 2021
This paper provides an in‐depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. Firstly, the traditional Mallat algorithm is optimized; since the mean value of the transform coefficients generated after the wavelet transform of the image is used as the initial value of ...
Yiying Liu, Young Chun Ko, Miaochao Chen
wiley   +1 more source

IMPROVED POLYNOMIAL-TIME PLAINTEXT-RECOVERY ATTACK ON THE MATRIX-BASED KNAPSACK CIPHER

open access: yesРадіоелектронні і комп'ютерні системи, 2020
Asymmetric ciphers are widely used to ensure the confidentiality of data transmission via insecure channels. These cryptosystems allow the interacting parties to create a shared secret key for a symmetric cipher in such a way that an eavesdropper gets no
Олексій Сергійович Вамболь
doaj   +1 more source

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Multivariate Profiling of Hulls for Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov   +2 more
doaj   +1 more source

09031 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2009
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena   +3 more
core   +1 more source

Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui\u27s Algorithm 1 [PDF]

open access: yes, 2009
In one dimension, there is essentially just one binomially distributed statistic, bias or correlation, for testing correctness of a key bit in Matsui\u27s Algorithm 1. In multiple dimensions, different statistical approaches for finding the correct
Cho, Joo Yeon   +2 more
core   +1 more source

Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj   +1 more source

Home - About - Disclaimer - Privacy