-
61
Higher-order differences based research on comparison between type-1 generalized Feistel-SP network and Feistel-SPSP network
Published 2014-07-01“…The powers against the higher-order differential cryptanalysis of the single-SP(substitution-permutation) model and the double-SP model are studied in the type-1 Feistel network by analyzing the growths of algebraic degrees. …”
Get full text
Article -
62
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.…”
Get full text
Article -
63
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…Cryptosystems that use the conventional countermeasures cannot preserve secrecy against various cryptanalysis approaches, including side channel analysis and brute-force attacks. …”
Get full text
Article -
64
Unveiling the Neutral Difference and Its Automated Search
Published 2024-01-01“…In this work, we propose the neutral difference table and establish a link between boomerang cryptanalysis and neutral differences. Furthermore, we propose an automated search for neutral differences to address the problem of a limited search range of neutral differences, as previous approaches relied on experimental testing. …”
Get full text
Article -
65
An efficient construction of key-dependent substitution box based on chaotic sine map
Published 2019-12-01“…The experimental results confirmed that the proposed method to construct substitution box has acceptable cryptographic properties to resist against various cryptanalysis.…”
Get full text
Article -
66
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01“…We evaluated several cryptographic protocols, including AES-ECB, AES-GCM, ChaCha20, RSA, and ECC, against critical metrics such as security level, efficiency, side-channel resistance, and cryptanalysis resistance. Our findings demonstrate that this integrated approach significantly enhances both security and efficiency across all evaluated protocols. …”
Get full text
Article -
67
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
Published 2024-01-01“…The stream cipher ChaCha has been subjected to differential linear cryptanalysis since 2008. Aumasson et al. (2008) laid the groundwork for this attack, employing the concept of probabilistically neutral bits for key recovery. …”
Get full text
Article -
68
Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks
Published 2016-07-01“…Choi et al. analyzed Yoon and Kim’s scheme and performed a security cryptanalysis in 2016. They demonstrated that Yoon and Kim’s scheme had several security problems, and proposed instead an improved biometric-based user authentication scheme using fuzzy extraction. …”
Get full text
Article -
69
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…Substitution boxes (S-boxes) play an important role in symmetric key cryptography because they add complexity and resist cryptanalysis, improving the overall security of encrypted data. …”
Get full text
Article -
70
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…They also proposed a new scheme after presenting the corresponding cryptanalysis. However, we found that Park et al.’s scheme is vulnerable to offline password guessing attack, which is the most serious threat against this kind of authentication scheme. …”
Get full text
Article -
71
De la logique à l’algorithme : la traduction dans le design de programmes
Published 2022-07-01“…The logic of substituting one string (sequence of characters) for another string shares common traits with information encryption analysis, ergo cryptanalysis. While the analytical models are similar, the linguistic goals are quite different : from the machine standpoint, automated translation focuses on syntax, and from a human standpoint, it focuses particularly on semantics. …”
Get full text
Article -
72
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01“…In this case, quantum cryptanalysis is reduced to Grover's scheme with exponential implementation complexity. …”
Get full text
Article -
73
High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function
Published 2025-01-01“…While existing symmetric block ciphers offer varying levels of security, they are susceptible to advancements in cryptanalysis. From this perspective, in this article, we present an efficient approach to enhancing the security of these ciphers through the integration of chaos theory. …”
Get full text
Article -
74
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application
Published 2022-01-01“…S-boxes with low value of differential uniformity and high value of nonlinearity are considered more secure against cryptanalysis attacks. For the construction of <inline-formula> <tex-math notation="LaTeX">$8\times 8$ </tex-math></inline-formula> S-boxes, an efficient and novel scheme is presented in this paper. …”
Get full text
Article