Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Khoongming Khoo"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 59-83 (2017)
The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced efficient computer-based search tools that can produce the best pos
Externí odkaz:
https://doaj.org/article/14b3d83d29a54760be0ab94cf2447e49
Publikováno v:
Journal of Cryptographic Engineering. 11:1-19
This paper proposes improved algebraic attacks that are effective for lightweight block ciphers. Concretely, we propose a new framework that leverages on algebraic preprocessing as well as modern SAT solvers to perform algebraic cryptanalysis on bloc
Publikováno v:
IEEE Transactions on Computers. 68:1561-1572
Algebraic differential fault attack (ADFA) is an attack in which an attacker combines a differential fault attack and an algebraic technique to break a targeted cipher. In this paper, we present three attacks using three different algebraic technique
Publikováno v:
Progress in Cryptology – AFRICACRYPT 2018 ISBN: 9783319893389
AFRICACRYPT
AFRICACRYPT
Many block ciphers and hash functions require the diffusion property of Maximum Distance Separable (MDS) matrices. Serial matrices with the MDS property obtain a trade-off between area requirement and clock cycle performance to meet the needs of ligh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6bc6de8f245985f98155fca7e032b3dc
https://doi.org/10.1007/978-3-319-89339-6_4
https://doi.org/10.1007/978-3-319-89339-6_4
Publikováno v:
Cryptography and Communications. 3:141-164
In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN) which can be considered as an extension of the outer function FO of the KASUMI block cipher. We show that the differential and linear probabilities of any n?+?1 rounds
Publikováno v:
Journal of Cryptology. 24:322-345
A provably secure countermeasure against first order side-channel attacks was proposed by Nikova et al. (P. Ning, S. Qing, N. Li (eds.) International conference in information and communications security. Lecture notes in computer science, vol. 4307,
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :11-21
In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off
Publikováno v:
Applicable Algebra in Engineering, Communication and Computing. 19:323-338
We construct two classes of balanced S-boxes with high nonlinearity 2 n-1−2(n-1)/2 for n odd. From known results, it can be deduced that for any S-box which has nonlinearity 2 n-1−2(n-1)/2, the unrestricted nonlinearity is lower bounded by 2 n-1
Publikováno v:
Advances in Mathematics of Communications. 2:201-221
We investigate the security of $n$-bit to $m$-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean functions. However, as shown by Zhang and Chan at Crypto 2000, line
Autor:
Khoongming Khoo, Guang Gong
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :29-35
In the past twenty years, there were only a few constructions for Boolean functions with nonlinearity exceeding the quadratic bound 2n-1 - 2(n-1)/2 when n is odd (we shall call them Boolean functions with very high nonlinearity). The first basic cons