Results 31 to 40 of about 372 (92)

Impossible Boomerang Attacks Revisited

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In
Jianing Zhang, Haoyang Wang, Deng Tang
doaj   +1 more source

A Meet-in-the-middle Attack Method of Deoxys-BC [PDF]

open access: yesJisuanji kexue
The Deoxys-BC adopting the SPN structure and TWEAK framework is a lightweight tweakable block cipher published at ASIACRPYPT 2014.By researching the internal characteristic and key schedule of the Deoxys-BC,a 6-round meet-in-the-middle distinguisher ...
LI Zheng, LI Manman, CHEN Shaozhen
doaj   +1 more source

Practical Key-Recovery Attack on MANTIS5

open access: yesIACR Transactions on Symmetric Cryptology, 2017
MANTIS is a lightweight tweakable block cipher published at CRYPTO 2016. In addition to the full 14-round version, MANTIS7, the designers also propose an aggressive 10-round version, MANTIS5.
Christoph Dobraunig   +3 more
doaj   +1 more source

Analysis of AES, SKINNY, and Others with Constraint Programming

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems.
Siwei Sun   +6 more
doaj   +1 more source

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: yesIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +1 more source

SECURITY ANALYSIS OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS [PDF]

open access: yes
The paper examines three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus. The research focuses on evaluating their security against various cryptographic attacks. Methods used: theoretical analysis and summary.
Dimitrov, Ivaylo, Dimitrova, Dilyana
core   +3 more sources

SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan

open access: yes, 2023
Secure elements physically exposed to adversaries are frequently targeted by fault attacks. These attacks can be utilized to hijack the control-flow of software allowing the attacker to bypass security measures, extract sensitive data, or gain full code ...
Mangard, Stefan, Nasahl, Pascal
core  

Design, realization and performance evaluation of a low latency high throughput authenticated encryption module [PDF]

open access: yes, 2022
LAUREA MAGISTRALELa necessità di sicurezza delle informazioni scambiate su Internet è al suo massimo. Anche le reti in fibra ottica, che compongono la spina dorsale di Internet ed erano considerate sicure, sono ora vulnerabili a tentativi di ...
dell'Oglio, Luca
core  

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks [PDF]

open access: yes, 2023
Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of important attacks on block ciphers. For example, the impossible differential attack was the first cryptanalytic attack on 7 rounds of AES.
Hosein Hadipour   +2 more
core  

Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges [PDF]

open access: yes, 2022
The guess-and-determine technique is one of the most widely used techniques in cryptanalysis to recover unknown variables in a given system of relations.
Hosein Hadipour, Maria Eichlseder
core  

Home - About - Disclaimer - Privacy