Results 61 to 70 of about 738 (105)

Automated Differential‐Linear Cryptanalysis for AND‐RX Ciphers

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential‐linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has been not only extensively researched but also proven to be effective.
Wenya Li, Kai Zhang, Bin Hu, Yong Yu
wiley   +1 more source

Design and Analysis of Cryptographic Hash Functions [PDF]

open access: yes, 2016
Wydział Matematyki i InformatykiKryptograficzne funkcje haszujące stanowią element składowy wielu algorytmów kryptograficznych. Przykładowymi zastosowaniami kryptograficznych funkcji haszujących są podpisy cyfrowe oraz kody uwierzytelniania wiadomości.
Sokołowski, Przemysław
core  

New Differential‐Based Distinguishers for Ascon via Constraint Programming

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self‐evaluation and third‐party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several differential‐based distinguishers.
Chan Song   +3 more
wiley   +1 more source

MILP/MIQCP‐Based Fully Automatic Method of Searching for Differential‐Linear Distinguishers for SIMON‐Like Ciphers

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Differential‐linear (DL) cryptanalysis is an important cryptanalytic method in cryptography and has received extensive attention from the cryptography community since its proposal by Langford and Hellman in 1994. At CT‐RSA 2023, Bellini et al. introduced continuous difference propagations of XOR, rotation, and modulo‐addition operations and proposed a ...
Yanyan Zhou   +3 more
wiley   +1 more source

An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers [PDF]

open access: yes, 2020
An increasing number of lightweight cryptographic primitives have been published recently. Some of these proposals are ARX primitives, which have shown a great performance in software.
Adrian Ranea, Tomer Ashur, Yunwen Liu
core  

Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting [PDF]

open access: yes, 2022
In this paper, we aim to present a quantum setting oriented preimage attack against 4-round Keccak-224. An important technique we called the allocating rotational cryptanalysis takes the preimage attack into the situation of 2-block preimage recovery ...
Baocang Wang   +4 more
core  

Extending Differential Fault Analysis to Dynamic S-Box Advanced Encryption Standard Implementations [PDF]

open access: yes, 2014
Advanced Encryption Standard (AES) is a worldwide cryptographic standard for symmetric key cryptography. Many attacks try to exploit inherent weaknesses in the algorithm or use side channels to reduce entropy.
Flamm, Bradley M.
core   +1 more source

A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. [PDF]

open access: yesPLoS One, 2020
Siddiqui N   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy