Differential Properties of LRX-analogues of Small Constant Multiplication [PDF]
In this work, we consider a class of mappings over bit vectors which imitate the multiplication by small constants with pure logic operations and non-cyclic shifts.
Yakovliev, Serhii
core +1 more source
Analysis of Advanced Encryption Standards [PDF]
The Advanced Encryption Standard (AES),the block cipher ratified as a standard by National Instituteof Standards and Technology of the United States (NIST), waschosen using a process markedly more open and transparentthan its predecessor, the aging Data ...
., Dr. A V Suresh, ., Minal Moharir
core +1 more source
Security of the SHA-3 candidates Keccak and Blue Midnight Wish: Zero-sum property [PDF]
The SHA-3 competition for the new cryptographic standard was initiated by National Institute of Standards and Technology (NIST) in 2007. In the following years, the event grew to one of the top areas currently being researched by the CS and cryptographic
Andreicheva, Liliya
core +1 more source
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers
An increasing number of lightweight cryptographic primitives have been published recently. Some of these proposals are ARX primitives, which have shown a great performance in software. Rotational-XOR cryptanalysis is a statistical technique to attack ARX primitives.
Ranea, Adrian, Liu, Yunwen, Ashur, Tomer
openaire +1 more source
Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis [PDF]
Recently, Baudrin et al. analyzed a special case of Wagner\u27s commutative diagram cryptanalysis, referred to as commutative cryptanalysis. For a family $(E_k)_k$ of permutations on a finite vector space $G$, commutative cryptanalysis exploits the ...
Christof Beierle +6 more
core
Eukaryotic genomes may exhibit up to 10 generic classes of gene promoters. [PDF]
Gagniuc P, Ionescu-Tirgoviste C.
europepmc +1 more source
Searching and Mining Trillions of Time Series Subsequences under Dynamic Time Warping. [PDF]
Rakthanmanon T +7 more
europepmc +1 more source
Development of a Layout-based Tool for the evaluation of an RTL Laser Fault Model [PDF]
Tampas, Marios +1 more
core +1 more source
Addressing Big Data Time Series: Mining Trillions of Time Series Subsequences Under Dynamic Time Warping. [PDF]
Rakthanmanon T +7 more
europepmc +1 more source
Further observations on the security of Speck32-like ciphers using machine learning. [PDF]
Hou Z, Ren J, Chen S.
europepmc +1 more source

