Multidimensional zero‐correlation linear cryptanalysis of lightweight block cipher Piccolo‐128 [PDF]
AbstractPiccolo is a lightweight block cipher proposed at CHES 2011. This paper firstly gives the zero‐correlation linear approximations over 7‐round Piccolo and studies the security of Piccolo‐128 against multidimensional zero‐correlation linear cryptanalysis. Based on the statistic used in multidimensional linear cryptanalysis to detect the right key
Li‐shi Fu +2 more
openaire +1 more source
An intelligent information forwarder for healthcare big data systems with distributed wearable sensors [PDF]
© 2016 IEEE. An increasing number of the elderly population wish to live an independent lifestyle, rather than rely on intrusive care programmes. A big data solution is presented using wearable sensors capable of carrying out continuous monitoring of the
Jiang, Ping +6 more
core +1 more source
Multi-dimensional key generation of ICMetrics for cloud computing [PDF]
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa +3 more
core +2 more sources
A Key Selected S‐Box Mechanism and Its Investigation in Modern Block Cipher Design
The block cipher is an important means to provide data confidentiality in reality, and the S‐box is an essential part in most of modern block cipher designs. In 1973, Feistel used a key selected S‐box mechanism in his early block cipher designs, whose idea is to let each S‐box have two different states and use a key bit to select which of the two ...
Jiqiang Lu, Hwajung Seo, Kaitai Liang
wiley +1 more source
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
In the past decades, considerable attention has been paid to the chaos‐based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo‐randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system.
Yucheng Chen +3 more
wiley +1 more source
Cryptographic Strength Evaluation of Key Schedule Algorithms
Key schedule algorithms play an important role in modern encryption algorithms, and their security is as crucial as the security of the encryption algorithms themselves. Many studies have been performed on the cryptographic strength evaluation of the encryption algorithms; however, strength evaluation of the key schedule algorithms often obtains less ...
Shazia Afzal +5 more
wiley +1 more source
Polynomial-Time Amoeba Neighborhood Membership and Faster Localized Solving [PDF]
We derive efficient algorithms for coarse approximation of algebraic hypersurfaces, useful for estimating the distance between an input polynomial zero set and a given query point. Our methods work best on sparse polynomials of high degree (in any number
A. Dickenstein +35 more
core +1 more source
Cryptosystem Identification Scheme Based on ASCII Code Statistics
In the field of information security, block cipher is widely used in the protection of messages, and its safety naturally attracts people’s attention. The identification of the cryptosystem is the premise of encrypted data analysis. It belongs to the category of attack analysis in cryptanalysis and has important theoretical significance and application
Wenyu Zhang +3 more
wiley +1 more source
Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing +3 more
wiley +1 more source
Towards a spectral approach for the design of self-synchronizing stream ciphers [PDF]
International audienceThis paper addresses the problem of characterizing the func- tions that can be used in the design of self-synchronizing stream ciphers. We propose a general framework based on a spectral characterization through correlation matrices
Guillot, Philippe +2 more
core +3 more sources

