Showing 1 - 20 results of 194 for search '"cipher"', query time: 0.04s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Survey on approaches of stream cipher cryptanalysis by Zhaocun ZHOU, Dengguo FENG

    Published 2022-11-01
    Subjects: “…stream cipher…”
    Get full text
    Article
  5. 5
  6. 6

    Cryptanalysis of Loiss Stream Cipher-Revisited by Lin Ding, Chenhui Jin, Jie Guan, Qiuyan Wang

    Published 2014-01-01
    “…Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231 and a data complexity of 268, which reduces the time complexity of the Guess and Determine attack proposed by the designers by a factor of 216. …”
    Get full text
    Article
  7. 7

    Integral attack on MIBS block cipher by Zhi-shu PAN, Jian-sheng GUO, Jin-ke CAO, Wei LUO

    Published 2014-07-01
    Subjects: “…block cipher…”
    Get full text
    Article
  8. 8

    Differential-linear cryptanalysis of PRINCE cipher by Zhengbin LIU

    Published 2021-08-01
    Subjects: “…lightweight block cipher…”
    Get full text
    Article
  9. 9

    Meet-in-the-middle attacks on FOX block cipher by IRong-jia L, INChen-hui J

    Published 2016-08-01
    Subjects: “…block cipher…”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Improved meet-in-the-middle attack on ARIA cipher by Man-man LI, Shao-zhen CHEN

    Published 2015-03-01
    Subjects: “…block cipher…”
    Get full text
    Article
  15. 15

    Quantum cryptanalysis of lightweight block cipher Piccolo by Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI

    Published 2023-06-01
    “…By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results show that the key can be recovered 56 bit with the time complexity 2 <sup>28</sup> and the occupation of 464 qubit.Moreover, if attack rounds r>6,the time complexity is 2 <sup>28+16(r-6)</sup>, which is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msup> <mn>2</mn> <mrow> <mn>68</mn></mrow> </msup> </mrow> </mfrac> </math></inline-formula> of Grover quantum brute-force search.The time complexity of the proposed attack method is significantly reduced compared with Grover search and is also better than that of traditional cryptanalysis, which lays a foundation for the subsequent research on quantum attacks of lightweight block ciphers.…”
    Get full text
    Article
  16. 16

    Differential fault attack on LiCi cipher by Weijian CHEN, Haoxiang LUO

    Published 2021-04-01
    Subjects: “…LiCi cipher…”
    Get full text
    Article
  17. 17

    Construction of diffusion layers based on cipher structures by Peng-fei LI

    Published 2017-06-01
    Subjects: “…block cipher…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20