Showing 1 - 20 results of 26 for search '"Cryptanalysis"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong

    Published 2014-01-01
    “…In this paper, we propose related-key cryptanalysis of PRINTcipher. To recover the 80-bit secret key of PRINTcipher-48, our attack requires 2 47 related-key chosen plaintexts with a computational complexity of 2 60 · 62 . …”
    Get full text
    Article
  6. 6

    Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map by Jiseung Kim, Changmin Lee

    Published 2022-05-01
    “…Then, they are used to mitigate parameter constraints of the message space recovering algorithm. Then, a cryptanalysis of the FRS obfuscation based on the recovered message space is proposed. …”
    Get full text
    Article
  7. 7

    Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis by Kaixin Zhao, Jie Cui, Zhiqiang Xie

    Published 2017-01-01
    “…Based on this, an algebraic cryptanalysis scheme of AES-256 using Gröbner basis is proposed. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS by Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi

    Published 2024-01-01
    “…In this paper, we consider the automatic differential cryptanalysis of reflection block ciphers based on Boolean satisfiability (SAT) method. …”
    Get full text
    Article
  11. 11
  12. 12

    A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis by Gao Wang, Gaoli Wang, Siwei Sun

    Published 2024-01-01
    “…At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al. provided a generic tool to automatically train the (related-key) differential neural distinguishers for different block ciphers. …”
    Get full text
    Article
  13. 13

    Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks by Madiha Khalid, Umar Mujahid, Muhammad Najam-ul-Islam

    Published 2018-08-01
    “…In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. …”
    Get full text
    Article
  17. 17

    Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography by J.‐F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, F. Song

    Published 2023-03-01
    “…The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.…”
    Get full text
    Article
  18. 18

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…Cryptosystems that use the conventional countermeasures cannot preserve secrecy against various cryptanalysis approaches, including side channel analysis and brute-force attacks. …”
    Get full text
    Article
  19. 19

    Unveiling the Neutral Difference and Its Automated Search by Guangqiu Lv, Chenhui Jin, Zhen Shi, Ting Cui

    Published 2024-01-01
    “…In this work, we propose the neutral difference table and establish a link between boomerang cryptanalysis and neutral differences. Furthermore, we propose an automated search for neutral differences to address the problem of a limited search range of neutral differences, as previous approaches relied on experimental testing. …”
    Get full text
    Article
  20. 20

    An efficient construction of key-dependent substitution box based on chaotic sine map by Muhammad Usama, Osama Rehman, Imran Memon, Safdar Rizvi

    Published 2019-12-01
    “…The experimental results confirmed that the proposed method to construct substitution box has acceptable cryptographic properties to resist against various cryptanalysis.…”
    Get full text
    Article