-
1
-
2
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Subjects: Get full text
Article -
3
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01Subjects: “…cryptanalysis…”
Get full text
Article -
4
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01Subjects: Get full text
Article -
5
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…In this paper, we propose related-key cryptanalysis of PRINTcipher. To recover the 80-bit secret key of PRINTcipher-48, our attack requires 2 47 related-key chosen plaintexts with a computational complexity of 2 60 · 62 . …”
Get full text
Article -
6
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…Then, they are used to mitigate parameter constraints of the message space recovering algorithm. Then, a cryptanalysis of the FRS obfuscation based on the recovered message space is proposed. …”
Get full text
Article -
7
Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis
Published 2017-01-01“…Based on this, an algebraic cryptanalysis scheme of AES-256 using Gröbner basis is proposed. …”
Get full text
Article -
8
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01Get full text
Article -
9
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Get full text
Article -
10
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…In this paper, we consider the automatic differential cryptanalysis of reflection block ciphers based on Boolean satisfiability (SAT) method. …”
Get full text
Article -
11
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01Subjects: “…Cryptanalysis…”
Get full text
Article -
12
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al. provided a generic tool to automatically train the (related-key) differential neural distinguishers for different block ciphers. …”
Get full text
Article -
13
Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks
Published 2018-08-01“…In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. …”
Get full text
Article -
14
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
15
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
16
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. …”
Get full text
Article -
17
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.…”
Get full text
Article -
18
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…Cryptosystems that use the conventional countermeasures cannot preserve secrecy against various cryptanalysis approaches, including side channel analysis and brute-force attacks. …”
Get full text
Article -
19
Unveiling the Neutral Difference and Its Automated Search
Published 2024-01-01“…In this work, we propose the neutral difference table and establish a link between boomerang cryptanalysis and neutral differences. Furthermore, we propose an automated search for neutral differences to address the problem of a limited search range of neutral differences, as previous approaches relied on experimental testing. …”
Get full text
Article -
20
An efficient construction of key-dependent substitution box based on chaotic sine map
Published 2019-12-01“…The experimental results confirmed that the proposed method to construct substitution box has acceptable cryptographic properties to resist against various cryptanalysis.…”
Get full text
Article