Showing 61 - 74 results of 74 for search '"Cryptanalysis"', query time: 0.05s Refine Results
  1. 61

    Higher-order differences based research on comparison between type-1 generalized Feistel-SP network and Feistel-SPSP network by ONGLe D, UJiao D, UWen-ling W

    Published 2014-07-01
    “…The powers against the higher-order differential cryptanalysis of the single-SP(substitution-permutation) model and the double-SP model are studied in the type-1 Feistel network by analyzing the growths of algebraic degrees. …”
    Get full text
    Article
  2. 62

    Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography by J.‐F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, F. Song

    Published 2023-03-01
    “…The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.…”
    Get full text
    Article
  3. 63

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…Cryptosystems that use the conventional countermeasures cannot preserve secrecy against various cryptanalysis approaches, including side channel analysis and brute-force attacks. …”
    Get full text
    Article
  4. 64

    Unveiling the Neutral Difference and Its Automated Search by Guangqiu Lv, Chenhui Jin, Zhen Shi, Ting Cui

    Published 2024-01-01
    “…In this work, we propose the neutral difference table and establish a link between boomerang cryptanalysis and neutral differences. Furthermore, we propose an automated search for neutral differences to address the problem of a limited search range of neutral differences, as previous approaches relied on experimental testing. …”
    Get full text
    Article
  5. 65

    An efficient construction of key-dependent substitution box based on chaotic sine map by Muhammad Usama, Osama Rehman, Imran Memon, Safdar Rizvi

    Published 2019-12-01
    “…The experimental results confirmed that the proposed method to construct substitution box has acceptable cryptographic properties to resist against various cryptanalysis.…”
    Get full text
    Article
  6. 66

    Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms by Purushottam Singh, Prashant Pranav, Sandip Dutta

    Published 2025-01-01
    “…We evaluated several cryptographic protocols, including AES-ECB, AES-GCM, ChaCha20, RSA, and ECC, against critical metrics such as security level, efficiency, side-channel resistance, and cryptanalysis resistance. Our findings demonstrate that this integrated approach significantly enhances both security and efficiency across all evaluated protocols. …”
    Get full text
    Article
  7. 67

    Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha by Nitin Kumar Sharma, Sabyasachi Dey

    Published 2024-01-01
    “…The stream cipher ChaCha has been subjected to differential linear cryptanalysis since 2008. Aumasson et al. (2008) laid the groundwork for this attack, employing the concept of probabilistically neutral bits for key recovery. …”
    Get full text
    Article
  8. 68

    Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks by YoHan Park, SungYup Lee, ChangKyun Kim, YoungHo Park

    Published 2016-07-01
    “…Choi et al. analyzed Yoon and Kim’s scheme and performed a security cryptanalysis in 2016. They demonstrated that Yoon and Kim’s scheme had several security problems, and proposed instead an improved biometric-based user authentication scheme using fuzzy extraction. …”
    Get full text
    Article
  9. 69

    A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption by Muhammad Asif, Sayeda Wajiha, Sameh Askar, Hijaz Ahmad

    Published 2024-01-01
    “…Substitution boxes (S-boxes) play an important role in symmetric key cryptography because they add complexity and resist cryptanalysis, improving the overall security of encrypted data. …”
    Get full text
    Article
  10. 70

    Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps by Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu

    Published 2019-04-01
    “…They also proposed a new scheme after presenting the corresponding cryptanalysis. However, we found that Park et al.’s scheme is vulnerable to offline password guessing attack, which is the most serious threat against this kind of authentication scheme. …”
    Get full text
    Article
  11. 71

    De la logique à l’algorithme : la traduction dans le design de programmes by Kim Sacks

    Published 2022-07-01
    “…The logic of substituting one string (sequence of characters) for another string shares common traits with information encryption analysis, ergo cryptanalysis. While the analytical models are similar, the linguistic goals are quite different : from the machine standpoint, automated translation focuses on syntax, and from a human standpoint, it focuses particularly on semantics. …”
    Get full text
    Article
  12. 72

    Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives by Yevhen Kotukh, Hennadii Khalimov

    Published 2024-06-01
    “…In this case, quantum cryptanalysis is reduced to Grover's scheme with exponential implementation complexity. …”
    Get full text
    Article
  13. 73

    High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function by Medien Zeghid, Hassan Yousif Ahmed, Akhtar Nawaz Khan

    Published 2025-01-01
    “…While existing symmetric block ciphers offer varying levels of security, they are susceptible to advancements in cryptanalysis. From this perspective, in this article, we present an efficient approach to enhancing the security of these ciphers through the integration of chaos theory. …”
    Get full text
    Article
  14. 74

    A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application by Abid Mahboob, Muhammad Asif, Imran Siddique, Aysha Saleem, Muhammad Nadeem, Dariusz Grzelczyk, Jan Awrejcewicz

    Published 2022-01-01
    “…S-boxes with low value of differential uniformity and high value of nonlinearity are considered more secure against cryptanalysis attacks. For the construction of <inline-formula> <tex-math notation="LaTeX">$8\times 8$ </tex-math></inline-formula> S-boxes, an efficient and novel scheme is presented in this paper. …”
    Get full text
    Article