Zobrazeno 1 - 10
of 16 418
pro vyhledávání: '"Cryptanalysis"'
Autor:
Wan Nur Aqlili Ruzai, You Ying, Khairun Nisak Muhammad, Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin
Publikováno v:
AIMS Mathematics, Vol 9, Iss 10, Pp 28211-28231 (2024)
The Rivest-Shamir-Adleman (RSA) algorithm is a widely utilized technique in asymmetric cryptography, primarily for verifying digital signatures and encrypting messages. Its security relies on the integer factorization problem's difficulty, which is c
Externí odkaz:
https://doaj.org/article/8630e31f86044eba94a795c9ca0b4a65
Autor:
Dongjae Lee, Seokhie Hong
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum collision attacks on hash functions. Their proposal presented a quantum adaptation of the rebound attack and revealed that differential trails, which have too low probabili
Externí odkaz:
https://doaj.org/article/ff54f031fed24988b03b2b9c707638c2
Autor:
Xavier Bonnetain, André Schrottenloher
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
Quantum attacks using superposition queries are known to break many classically secure modes of operation. While these attacks do not necessarily threaten the security of the modes themselves, since they rely on a strong adversary model, they help us
Externí odkaz:
https://doaj.org/article/49137e6c63dd4581a8f65375db2f2ff9
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it. Previous works only fo
Externí odkaz:
https://doaj.org/article/f44f697d5b6e4b1fbc61b4cd78611701
Publikováno v:
IEEE Access, Vol 12, Pp 24274-24305 (2024)
The Skipjack algorithm is used by many Internet of Things (IoT) devices to secure and encrypt data. Skipjack-encrypted data has been discovered to be vulnerable to Differential Cryptanalysis (DC) and Linear Cryptanalysis (LC) attacks. DC and LC attac
Externí odkaz:
https://doaj.org/article/d5428fc3b1854dadb737cd7de0c732e7
Autor:
Nasratullah Ghafoori, Atsuko Miyaji
Publikováno v:
IEEE Access, Vol 12, Pp 13386-13399 (2024)
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher. The stu
Externí odkaz:
https://doaj.org/article/3c52141636e84815bc9c7792e961c959
Autor:
Eskeland Sigurd
Publikováno v:
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 18-34 (2024)
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechan
Externí odkaz:
https://doaj.org/article/c67ca02f45524db3916a9ae2e40660ed
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Alex Charlès, Aleksei Udovenko
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
This work proposes a new white-box attack technique called filtering, which can be combined with any other trace-based attack method. The idea is to filter the traces based on the value of an intermediate variable in the implementation, aiming to fix
Externí odkaz:
https://doaj.org/article/5a999d5ddfa248bd8475e4c075535246
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses. In Lu’s work, the considered im
Externí odkaz:
https://doaj.org/article/6da41e6ecf6a474c992c9ffcf6feefba