Showing 21 - 40 results of 74 for search '"Cryptanalysis"', query time: 0.04s Refine Results
  1. 21

    Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map by Jiseung Kim, Changmin Lee

    Published 2022-05-01
    “…Then, they are used to mitigate parameter constraints of the message space recovering algorithm. Then, a cryptanalysis of the FRS obfuscation based on the recovered message space is proposed. …”
    Get full text
    Article
  2. 22

    Security against differential and linear cryptanalysis for general SPT models by Feng-mei LIU, Lian-jun CHEN, Chun-xiang LI, Yan-mei LI, Guo-shuang ZHANG

    Published 2012-01-01
    “…To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the layer for permutation.The upper bound of the maximum differentia lity was given when the branch number of P was optimal,and the upper bound of the maximum linear approximation probability and the maximum linear hull probability are given when the branch number of P was optimal and when S and T were balanced.As a consequence,the problem about evaluating the security against differential and linear cryptanalysis for general SPT models was resolved partially.…”
    Get full text
    Article
  3. 23
  4. 24
  5. 25

    Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis by Kaixin Zhao, Jie Cui, Zhiqiang Xie

    Published 2017-01-01
    “…Based on this, an algebraic cryptanalysis scheme of AES-256 using Gröbner basis is proposed. …”
    Get full text
    Article
  6. 26
  7. 27
  8. 28
  9. 29

    Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS by Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi

    Published 2024-01-01
    “…In this paper, we consider the automatic differential cryptanalysis of reflection block ciphers based on Boolean satisfiability (SAT) method. …”
    Get full text
    Article
  10. 30
  11. 31
  12. 32

    A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis by Gao Wang, Gaoli Wang, Siwei Sun

    Published 2024-01-01
    “…At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al. provided a generic tool to automatically train the (related-key) differential neural distinguishers for different block ciphers. …”
    Get full text
    Article
  13. 33

    Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme by XU Jing-fang1, CUI Guo-hua1, CHENG Qi2, ZHANG Zhi1

    Published 2009-01-01
    “…Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme was presented, in which a malicious broadcast receiver might easily recover old t shares, new share and further reconstruct the secret S. …”
    Get full text
    Article
  14. 34
  15. 35

    Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks by Madiha Khalid, Umar Mujahid, Muhammad Najam-ul-Islam

    Published 2018-08-01
    “…In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. …”
    Get full text
    Article
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40