Results 91 to 100 of about 738 (105)
Some of the next articles are maybe not open access.
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers
IEEE Transactions on Information Theory, 2023Kai Zhang +6 more
openaire +3 more sources
Rotational Cryptanalysis from a Differential-Linear Perspective
Lecture Notes in Computer Science, 2021Yunwen Liu, Siwei Sun, Chao Li
openaire +3 more sources
Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak
Quantum Information & Computation, 2023The Exclusive-OR Sum-of-Product (ESOP) minimization problem has long been of interest to the research community because of its importance in classical logic design (including low-power design and design for test), reversible logic synthesis, and knowledge discovery, among other applications.
Runsong Wang +4 more
openaire +1 more source
Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices
International Journal of Knowledge-based and Intelligent Engineering Systems, 2021The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT devices and cloud. The major attacks like de-synchronization, and disclosure has arises in the devices, this has been prevented.
Nath, Seema +2 more
openaire +1 more source
Rotational Cryptanalysis on MAC Algorithm Chaskey
2020In this paper we generalize the Markov theory with respect to a relation between two plaintexts and not their difference and apply it for rotational pairs. We perform a related-key attack over Chaskey- a lightweight MAC algorithm for 32-bit micro controllers - and find a distinguisher by using rotational probabilities.
Liliya Kraleva +2 more
openaire +1 more source
Rotational Cryptanalysis of Salsa Core Function
2020This paper presents rotational cryptanalysis of the Salsa core function, and warns designers of symmetric-key primitives not to incorporate the Salsa core function into other encryption schemes. The core functions of Serpent, ChaCha, and AES are actually incorporated into SOSEMANUK, BLAKE2, and SNOW-V, respectively.
openaire +1 more source
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers
Computer Journal, 2021Mingjiang Huang, Liming Wang
exaly

