-
1
-
2
Survey on approaches of stream cipher cryptanalysis
Published 2022-11-01Subjects: “…linear distinguishing cryptanalysis…”
Get full text
Article -
3
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01Subjects: Get full text
Article -
4
-
5
Impossible differential cryptanalysis of Saturnin algorithm
Published 2022-03-01Get full text
Article -
6
Differential-linear cryptanalysis of PRINCE cipher
Published 2021-08-01Subjects: “…differential-linear cryptanalysis…”
Get full text
Article -
7
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Subjects: Get full text
Article -
8
-
9
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Get full text
Article -
10
Related-key impossible boomerang cryptanalysis on TWINE
Published 2019-09-01“…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
Get full text
Article -
11
Quantum cryptanalysis of lightweight block cipher Piccolo
Published 2023-06-01Subjects: “…quantum cryptanalysis…”
Get full text
Article -
12
Related-key impossible boomerang cryptanalysis on LBlock
Published 2017-05-01“…The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.A 15-round related-key impossible boomerang distinguisher was constructed.Based on the new distinguisher,an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end.The attack on 22-round LBlock required data complexity of only 2<sup>51.3</sup>plaintexts and computational complexity of about 2 <sup>71.54</sup>22-round encryptions.Compared with published cryptanalysis results on 22-round LBlock,proposed attack has great advantages on data and computational complexities.…”
Get full text
Article -
13
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01Get full text
Article -
14
Cryptanalysis and improvement of several certificateless digital signature schemes
Published 2008-01-01Get full text
Article -
15
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01Get full text
Article -
16
-
17
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01Subjects: Get full text
Article -
18
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01Subjects: “…cryptanalysis…”
Get full text
Article -
19
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01Subjects: Get full text
Article -
20
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…In this paper, we propose related-key cryptanalysis of PRINTcipher. To recover the 80-bit secret key of PRINTcipher-48, our attack requires 2 47 related-key chosen plaintexts with a computational complexity of 2 60 · 62 . …”
Get full text
Article