-
21
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…Then, they are used to mitigate parameter constraints of the message space recovering algorithm. Then, a cryptanalysis of the FRS obfuscation based on the recovered message space is proposed. …”
Get full text
Article -
22
Security against differential and linear cryptanalysis for general SPT models
Published 2012-01-01“…To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the layer for permutation.The upper bound of the maximum differentia lity was given when the branch number of P was optimal,and the upper bound of the maximum linear approximation probability and the maximum linear hull probability are given when the branch number of P was optimal and when S and T were balanced.As a consequence,the problem about evaluating the security against differential and linear cryptanalysis for general SPT models was resolved partially.…”
Get full text
Article -
23
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
Published 2021-08-01Subjects: Get full text
Article -
24
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01Get full text
Article -
25
Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis
Published 2017-01-01“…Based on this, an algebraic cryptanalysis scheme of AES-256 using Gröbner basis is proposed. …”
Get full text
Article -
26
Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
Published 2008-01-01Get full text
Article -
27
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01Get full text
Article -
28
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Get full text
Article -
29
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…In this paper, we consider the automatic differential cryptanalysis of reflection block ciphers based on Boolean satisfiability (SAT) method. …”
Get full text
Article -
30
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01Subjects: “…Cryptanalysis…”
Get full text
Article -
31
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128
Published 2017-11-01Subjects: Get full text
Article -
32
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al. provided a generic tool to automatically train the (related-key) differential neural distinguishers for different block ciphers. …”
Get full text
Article -
33
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
Published 2009-01-01“…Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. …”
Get full text
Article -
34
Zero correlation-integral attack of MIBS block cipher
Published 2016-11-01Subjects: Get full text
Article -
35
Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks
Published 2018-08-01“…In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. …”
Get full text
Article -
36
Fast algorithm to search for the minimum number of active S-boxes of block cipher
Published 2023-01-01Subjects: Get full text
Article -
37
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: Get full text
Article -
38
A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm
Published 2025-01-01Subjects: Get full text
Article -
39
-
40