Results 1 to 10 of about 738 (105)

Chaghri:A FHE-friendly Block Cipher [PDF]

open access: yes, 2022
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
Ashur, Tomer   +2 more
core   +1 more source

Security of a New Cryptographic Hash Function - Titanium [PDF]

open access: yes, 2018
This paper introduces the security analysis of Titanium hash function that uses SF block cipher and follows sponge construction. A brief description of the sponge function and the design choice of Titanium are introduced.
Al-Ahmad, Mohammad A.   +1 more
core   +3 more sources

Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices [PDF]

open access: yes, 2020
This work reports a novel chaos-based affine transformation generation method, which is based on rotational matrices to design strong key-based S-boxes.
Ahmad, W.   +13 more
core   +1 more source

Some Algebraic Properties of RX-Differential Probabilities of Boolean Mappings

open access: yesКібернетика та комп'ютерні технології
Introduction. ARX- and LRX- cryptosystems are based on extremely simple operations available at the level of computing processor instructions, such as modular addition, bitwise addition, rotations, etc.
Serhii Yakovliev
doaj   +1 more source

Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]

open access: yes, 2014
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M.   +2 more
core  

Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels

open access: yes, 2019
We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to ...
Genkin, Daniel   +3 more
core   +1 more source

HeW: AHash Function based on Lightweight Block Cipher FeW [PDF]

open access: yes, 2017
A new hash function HeW: A hash function based on light weight block cipher FeW is proposed in this paper. The compression function of HeW is based on block cipher FeW.
Dey, Dhananjoy   +3 more
core   +2 more sources

Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives [PDF]

open access: yes, 2023
SAT, SMT, MILP, and CP, have become prominent in the differential cryptanalysis of cryptographic primitives. In this paper, we review the techniques for constructing differential characteristic search models in these four formalisms.
Alessandro De Piccoli   +7 more
core   +1 more source

Rotational analysis of ChaCha permutation [PDF]

open access: yes, 2020
We show that the underlying permutation of ChaCha20 stream cipher does not behave as a random permutation for up to 17 rounds with respect to rotational cryptanalysis.
Barbero, Stefano   +2 more
core   +1 more source

Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette [PDF]

open access: yes, 2021
The differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994.
Chao Li, Siwei Sun, Yunwen Liu
core  

Home - About - Disclaimer - Privacy