Showing 1 - 20 results of 74 for search '"Cryptanalysis"', query time: 0.05s Refine Results
  1. 1
  2. 2

    Survey on approaches of stream cipher cryptanalysis by Zhaocun ZHOU, Dengguo FENG

    Published 2022-11-01
    Subjects: “…linear distinguishing cryptanalysis…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Differential-linear cryptanalysis of PRINCE cipher by Zhengbin LIU

    Published 2021-08-01
    Subjects: “…differential-linear cryptanalysis…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Related-key impossible boomerang cryptanalysis on TWINE by Min XIE, Feng TIAN, Jiaqi LI

    Published 2019-09-01
    “…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
    Get full text
    Article
  11. 11

    Quantum cryptanalysis of lightweight block cipher Piccolo by Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI

    Published 2023-06-01
    Subjects: “…quantum cryptanalysis…”
    Get full text
    Article
  12. 12

    Related-key impossible boomerang cryptanalysis on LBlock by Min XIE, Yan-li MU

    Published 2017-05-01
    “…The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.A 15-round related-key impossible boomerang distinguisher was constructed.Based on the new distinguisher,an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end.The attack on 22-round LBlock required data complexity of only 2<sup>51.3</sup>plaintexts and computational complexity of about 2 <sup>71.54</sup>22-round encryptions.Compared with published cryptanalysis results on 22-round LBlock,proposed attack has great advantages on data and computational complexities.…”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong

    Published 2014-01-01
    “…In this paper, we propose related-key cryptanalysis of PRINTcipher. To recover the 80-bit secret key of PRINTcipher-48, our attack requires 2 47 related-key chosen plaintexts with a computational complexity of 2 60 · 62 . …”
    Get full text
    Article