Results 31 to 40 of about 738 (105)

Differential Analysis of Round-Reduced AES Faulty Ciphertexts [PDF]

open access: yes, 2013
International audienceThis paper describes new Round Reduction analysis attacks on an Advanced Encryption Standard (AES) implemen- tation by laser fault injection.
Dutertre, Jean-Max   +2 more
core   +3 more sources

Differential and rotational cryptanalysis of round-reduced MORUS

open access: yesProceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017
In this paper we investigate the security margin of MORUS-an authenticated cipher taking part in the CAESAR competition. We propose a new key recovery approach, which can be seen as an accelerated exhaustive search. We also verify the resistance of MORUS against internal differential and rotational cryptanalysis.
Dwivedi, Ashutosh Dhar; id_orcid 0000-0001-8010-6275   +2 more
openaire   +3 more sources

Whirlwind: a new cryptographic hash function [PDF]

open access: yes, 2010
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of
Barreto, Paulo   +4 more
core   +3 more sources

The related-key analysis of feistel constructions [PDF]

open access: yes, 2014
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively.
A Biryukov   +34 more
core   +1 more source

Implementing Candidate Graded Encoding Schemes from Ideal Lattices [PDF]

open access: yes, 2015
International audienceMultilinear maps have become popular tools for designing cryptographic schemes since a first approximate realisation candidate was proposed by Garg, Gentry and Halevi (GGH).
Albrecht, Martin R.   +3 more
core   +4 more sources

Quantum Attacks on Mersenne Number Cryptosystems [PDF]

open access: yes, 2023
Mersenne number based cryptography was introduced by Aggarwal et al. as a potential post- quantum cryptosystem in 2017. Shortly after the publication Beunardeau et al.
Tiepelt, Kevin Marcel
core   +2 more sources

Martin Gardner and His Influence on Recreational Math [PDF]

open access: yes, 2020
Recreational mathematics is a relatively new field in the world of mathematics. While sometimes overlooked as frivolous since those who practice it need no advanced knowledge of the subject, recreational mathematics is a perfect transition for people to ...
DeLee, Rebecca
core   +1 more source

Pitfalls in Ultralightweight RFID Authentication Protocol [PDF]

open access: yes, 2022
Radio frequency identification (RFID) is one of the most promising identification schemes in the field of pervasive systems. Non-line of sight capability makes RFID systems more protuberant than its contended systems.
Khokhar, Umar Mujahid   +1 more
core   +2 more sources

Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations

open access: yesIACR Transactions on Symmetric Cryptology
This work presents an exact and compact formula for the probability of rotation-xor differentials (RX-differentials) through modular addition, for arbitrary rotation amounts, which has been a long-standing open problem. The formula comes with a rigorous
Alex Biryukov   +2 more
doaj   +1 more source

Functional Cryptanalysis: Application to reduced-round Xoodoo [PDF]

open access: yes, 2022
This paper proposes functional cryptanalysis, a flexible and versatile approach to analyse symmetric-key primitives with two primary features. Firstly, it is a generalization of multiple attacks including (but not limited to) differential, rotational and
Emanuele Bellini, Rusydi H. Makarim
core  

Home - About - Disclaimer - Privacy