Zobrazeno 1 - 10
of 238
pro vyhledávání: '"Piling-up lemma"'
Autor:
Tim Beyne
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920616
A new interpretation of linear cryptanalysis is proposed. This ‘geometric approach’ unifies all common variants of linear cryptanalysis, reveals links between various properties, and suggests additional generalizations. For example, new insights
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::268b2bf27c486e8890e78716e8ee4178
https://doi.org/10.1007/978-3-030-92062-3_2
https://doi.org/10.1007/978-3-030-92062-3_2
Publikováno v:
Journal of Cryptology. 32:1-34
Linear cryptanalysis introduced by Matsui is a statistical attack which exploits a binary linear relation between plaintext, ciphertext and key, either in Algorithm 1 for recovering one bit of information of the secret key of a block cipher, or in Al
Publikováno v:
SCIENTIA SINICA Informationis. 47:1395-1410
The security evaluation of lightweight block ciphers plays a critical role in determining the security margins for these ciphers. One method for finding the security margin of a block cipher is Biclique cryptanalysis. In this paper, we present a new
Publikováno v:
Microprocessors and Microsystems. 52:34-48
Recently, a new ultra lightweight block cipher called QTL has been proposed. The authors claim to achieve a fast diffusion in QTL by using a new variant of a generalized Feistel network structure that changes all block messages in one iterative round
Publikováno v:
Journal of Mathematical Cryptology, Vol 11, Iss 2, Pp 55-62 (2017)
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a candidate for Advanced Encryption Standard (AES). In this paper, we will propose a new chosen text attack, the multiple differential-zero correlation li
Autor:
Robert Tsenkov, Yuri L. Borissov
Publikováno v:
Electronic Notes in Discrete Mathematics. 57:205-210
We investigate two classes of 2-round iterative linear characteristics for DES-like ciphers obtained by embedding parity checks in the S-boxes of the original DES. This study complements our previous work [Linear Cryptanalysis and Modified DES with P
Publikováno v:
Telecommunications and Radio Engineering. 76:157-184
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1733-1737
Publikováno v:
IEEE Access, Vol 5, Pp 16124-16129 (2017)
This paper presents the cryptanalysis of optical ciphers combining double random phase encoding with permutation techniques, and shows its vulnerability against plaintext attack regardless of the implementation order of the two procedures. The equiva
Publikováno v:
Cybernetics and Information Technologies. 16:3-12
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes. More specifically, we examine the general situation when the output