Results 31 to 40 of about 738 (105)
Differential Analysis of Round-Reduced AES Faulty Ciphertexts [PDF]
International audienceThis paper describes new Round Reduction analysis attacks on an Advanced Encryption Standard (AES) implemen- tation by laser fault injection.
Dutertre, Jean-Max +2 more
core +3 more sources
Differential and rotational cryptanalysis of round-reduced MORUS
In this paper we investigate the security margin of MORUS-an authenticated cipher taking part in the CAESAR competition. We propose a new key recovery approach, which can be seen as an accelerated exhaustive search. We also verify the resistance of MORUS against internal differential and rotational cryptanalysis.
Dwivedi, Ashutosh Dhar; id_orcid 0000-0001-8010-6275 +2 more
openaire +3 more sources
Whirlwind: a new cryptographic hash function [PDF]
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of
Barreto, Paulo +4 more
core +3 more sources
The related-key analysis of feistel constructions [PDF]
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively.
A Biryukov +34 more
core +1 more source
Implementing Candidate Graded Encoding Schemes from Ideal Lattices [PDF]
International audienceMultilinear maps have become popular tools for designing cryptographic schemes since a first approximate realisation candidate was proposed by Garg, Gentry and Halevi (GGH).
Albrecht, Martin R. +3 more
core +4 more sources
Quantum Attacks on Mersenne Number Cryptosystems [PDF]
Mersenne number based cryptography was introduced by Aggarwal et al. as a potential post- quantum cryptosystem in 2017. Shortly after the publication Beunardeau et al.
Tiepelt, Kevin Marcel
core +2 more sources
Martin Gardner and His Influence on Recreational Math [PDF]
Recreational mathematics is a relatively new field in the world of mathematics. While sometimes overlooked as frivolous since those who practice it need no advanced knowledge of the subject, recreational mathematics is a perfect transition for people to ...
DeLee, Rebecca
core +1 more source
Pitfalls in Ultralightweight RFID Authentication Protocol [PDF]
Radio frequency identification (RFID) is one of the most promising identification schemes in the field of pervasive systems. Non-line of sight capability makes RFID systems more protuberant than its contended systems.
Khokhar, Umar Mujahid +1 more
core +2 more sources
Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations
This work presents an exact and compact formula for the probability of rotation-xor differentials (RX-differentials) through modular addition, for arbitrary rotation amounts, which has been a long-standing open problem. The formula comes with a rigorous
Alex Biryukov +2 more
doaj +1 more source
Functional Cryptanalysis: Application to reduced-round Xoodoo [PDF]
This paper proposes functional cryptanalysis, a flexible and versatile approach to analyse symmetric-key primitives with two primary features. Firstly, it is a generalization of multiple attacks including (but not limited to) differential, rotational and
Emanuele Bellini, Rusydi H. Makarim
core

