Results 21 to 30 of about 1,018 (121)
Zero‐Correlation Linear Cryptanalysis on SPARX‐64
SPARX is a family of ARX‐based block ciphers designed according to the long‐trail strategy, which has 32‐bit ARX‐based SBoxes and has provable bounds against single‐differential and single‐linear cryptanalysis. Since its proposation, some third‐party cryptanalysis methods have been presented. As far as we know, the best attacks against SPARX‐64 covered
Dawei Zhou +4 more
wiley +1 more source
On Multidimensional Linear Cryptanalysis [PDF]
Matsui's Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO'04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP'08, a different approach was taken by studying m-dimensional combined approximations from m base approximations ...
Nguyen, Phuong Ha +3 more
openaire +2 more sources
Computational Image Encryption Techniques: A Comprehensive Review
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote‐sensing, and medical‐imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification.
Mandeep Kaur +3 more
wiley +1 more source
Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design
This paper provides an in‐depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. Firstly, the traditional Mallat algorithm is optimized; since the mean value of the transform coefficients generated after the wavelet transform of the image is used as the initial value of ...
Yiying Liu, Young Chun Ko, Miaochao Chen
wiley +1 more source
IMPROVED POLYNOMIAL-TIME PLAINTEXT-RECOVERY ATTACK ON THE MATRIX-BASED KNAPSACK CIPHER
Asymmetric ciphers are widely used to ensure the confidentiality of data transmission via insecure channels. These cryptosystems allow the interacting parties to create a shared secret key for a symmetric cipher in such a way that an eavesdropper gets no
Олексій Сергійович Вамболь
doaj +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
Multivariate Profiling of Hulls for Linear Cryptanalysis
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov +2 more
doaj +1 more source
09031 Abstracts Collection -- Symmetric Cryptography [PDF]
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena +3 more
core +1 more source
Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui\u27s Algorithm 1 [PDF]
In one dimension, there is essentially just one binomially distributed statistic, bias or correlation, for testing correctness of a key bit in Matsui\u27s Algorithm 1. In multiple dimensions, different statistical approaches for finding the correct
Cho, Joo Yeon +2 more
core +1 more source
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis
Statistical attacks form an important class of attacks against block ciphers. By analyzing the distribution of the statistics involved in the attack, cryptanalysts aim at providing a good estimate of the data complexity of the attack.
Céline Blondeau, Kaisa Nyberg
doaj +1 more source

