Zobrazeno 1 - 10
of 1 132
pro vyhledávání: '"key recovery"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it. Previous works only fo
Externí odkaz:
https://doaj.org/article/f44f697d5b6e4b1fbc61b4cd78611701
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
This paper examines the security of Rocca, an authenticated encryption algorithm designed for Beyond 5G/6G contexts. Rocca has been revised multiple times in the initialization and finalization for security reasons. In this paper, we study how the ch
Externí odkaz:
https://doaj.org/article/d6e42655a51e49c08626862db52050fd
Autor:
Namhun Koo, Kyung-Ah Shim
Publikováno v:
IEEE Access, Vol 12, Pp 137412-137417 (2024)
Multivariate quadratic equation-based cryptographic algorithms are one of the promising post-quantum alternatives to current public-key cryptographic algorithms based on the discrete logarithm problem and the integer factorization problem. In this pa
Externí odkaz:
https://doaj.org/article/08df7cc63d0f43ac94919a522ea4aaeb
Autor:
Nitin Kumar Sharma, Sabyasachi Dey
Publikováno v:
IEEE Access, Vol 12, Pp 37000-37011 (2024)
The stream cipher ChaCha has been subjected to differential linear cryptanalysis since 2008. Aumasson et al. (2008) laid the groundwork for this attack, employing the concept of probabilistically neutral bits for key recovery. Subsequently, various e
Externí odkaz:
https://doaj.org/article/4802d600867d40c8869b462ccde9d2fa
Publikováno v:
IEEE Access, Vol 12, Pp 16462-16473 (2024)
Recently, Chait et al. proposed a new aggregate signature scheme under the RSA setting (IEEE Access, 2023). In this paper, we show that Chait et al.’s aggregate signature scheme is insecure when two signers collude with their own secret keys, by pr
Externí odkaz:
https://doaj.org/article/9953a73a23784166b8158a4038691aea
Autor:
Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
The Trusted Platform Module (TPM) is a widely deployed computer component that provides increased protection of key material during cryptographic operations, secure storage, and support for a secure boot with a remotely attestable state of the target
Externí odkaz:
https://doaj.org/article/07ce4cb0415c411d843401c0929d68d2
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
This paper presents practicable single trace attacks against the Hamming Quasi-Cyclic (HQC) Key Encapsulation Mechanism. These attacks are the first Soft Analytical Side-Channel Attacks (SASCA) against code-based cryptography. We mount SASCA based on
Externí odkaz:
https://doaj.org/article/6e6b08fca2c34532a8f959d0315ce8b2
Publikováno v:
Mathematics, Vol 12, Iss 17, p 2678 (2024)
Because of the substantial progress in quantum computing technology, the safety of traditional cryptologic schemes is facing serious challenges. In this study, we explore the quantum safety of the lightweight cipher MIBS and propose quantum key-recov
Externí odkaz:
https://doaj.org/article/4b573ddfc4d9439ead2159cbf9ba6c48
Autor:
Terry Shue Chien Lau, Muhammad Rezal Kamel Ariffin, Sook-Chin Yip, Ji-Jian Chin, Choo-Yee Ting
Publikováno v:
Heliyon, Vol 10, Iss 2, Pp e24185- (2024)
In recent research, Durandal, a signature scheme based on rank metrics following Schnorr's approach, was introduced to conceal secret key information by selectively manipulating the vector subspace of signatures. Later, an enhancement, namely the SHM
Externí odkaz:
https://doaj.org/article/65b21a6b8f4946629b44e8509afe622a
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signat
Externí odkaz:
https://doaj.org/article/baa5224df6bb435e844c75cf13c112a7