Results 91 to 100 of about 738 (105)
Some of the next articles are maybe not open access.

Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers

IEEE Transactions on Information Theory, 2023
Kai Zhang   +6 more
openaire   +3 more sources

Rotational Cryptanalysis from a Differential-Linear Perspective

Lecture Notes in Computer Science, 2021
Yunwen Liu, Siwei Sun, Chao Li
openaire   +3 more sources

Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak

Quantum Information & Computation, 2023
The Exclusive-OR Sum-of-Product (ESOP) minimization problem has long been of interest to the research community because of its importance in classical logic design (including low-power design and design for test), reversible logic synthesis, and knowledge discovery, among other applications.
Runsong Wang   +4 more
openaire   +1 more source

Cryptanalysis of a novel bitwise XOR rotational algorithm and security for IoT devices

International Journal of Knowledge-based and Intelligent Engineering Systems, 2021
The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT devices and cloud. The major attacks like de-synchronization, and disclosure has arises in the devices, this has been prevented.
Nath, Seema   +2 more
openaire   +1 more source

Rotational Cryptanalysis on MAC Algorithm Chaskey

2020
In this paper we generalize the Markov theory with respect to a relation between two plaintexts and not their difference and apply it for rotational pairs. We perform a related-key attack over Chaskey- a lightweight MAC algorithm for 32-bit micro controllers - and find a distinguisher by using rotational probabilities.
Liliya Kraleva   +2 more
openaire   +1 more source

Rotational Cryptanalysis of Salsa Core Function

2020
This paper presents rotational cryptanalysis of the Salsa core function, and warns designers of symmetric-key primitives not to incorporate the Salsa core function into other encryption schemes. The core functions of Serpent, ChaCha, and AES are actually incorporated into SOSEMANUK, BLAKE2, and SNOW-V, respectively.
openaire   +1 more source

Weak rotational property and its application

Designs, Codes, and Cryptography, 2023
Kai Zhang
exaly  

Home - About - Disclaimer - Privacy