Showing 1 - 20 results of 141 for search '"cryptanalysis"', query time: 0.06s Refine Results
  1. 1

    Survey on approaches of stream cipher cryptanalysis by Zhaocun ZHOU, Dengguo FENG

    Published 2022-11-01
    Subjects: “…linear distinguishing cryptanalysis…”
    Get full text
    Article
  2. 2
  3. 3

    Gröbner Basis Cryptanalysis of Ciminion and Hydra by Matthias Johann Steiner

    Published 2025-03-01
    “…With the Gröbner basis we can simplify cryptanalysis, as we no longer need to impose genericity assumptions to derive complexity estimates. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Differential-linear cryptanalysis of PRINCE cipher by Zhengbin LIU

    Published 2021-08-01
    Subjects: “…differential-linear cryptanalysis…”
    Get full text
    Article
  7. 7

    Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems by Riyam Noori Jawad, Faez Hassan Ali

    Published 2020-06-01
    Subjects: “…Ant Colony Optimization (ACO), Cryptanalysis, Genetic Algorithm (GA), Shrinking Generator, Stream Cipher.…”
    Get full text
    Article
  8. 8

    Optical Cryptanalysis Method Using Wavefront Shaping by Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng

    Published 2017-01-01
    “…The development of cryptanalysis strategies will also have a positive promotion for the cryptosystems themselves. …”
    Get full text
    Article
  9. 9
  10. 10

    Integral cryptanalysis on reduce-round SAILFISH-I by Yanjun Li, Lixian Zhang, Yiping Lin, Jian Liu, Yani Sun

    Published 2025-03-01
    “…Abstract SAILFISH-I, first proposed by Agarwal et al. in 2022, is a lightweight block cipher with a typical Feistel structure, which is evaluated for the first time in this paper for its resistance to integral cryptanalysis. Firstly, the S-box and the overall structure are modeled based on the MILP method. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Related-key impossible boomerang cryptanalysis on TWINE by Min XIE, Feng TIAN, Jiaqi LI

    Published 2019-09-01
    “…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
    Get full text
    Article
  14. 14
  15. 15

    ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS by Fadila Paradise, Kiki Ariyanti Sugeng

    Published 2023-12-01
    Subjects: “…algebraic cryptanalysis…”
    Get full text
    Article
  16. 16
  17. 17

    Quantum cryptanalysis of lightweight block cipher Piccolo by Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI

    Published 2023-06-01
    Subjects: “…quantum cryptanalysis…”
    Get full text
    Article
  18. 18

    Automated Differential-Linear Cryptanalysis for AND-RX Ciphers by Wenya Li, Kai Zhang, Bin Hu

    Published 2024-01-01
    “…Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. …”
    Get full text
    Article
  19. 19

    Related-key impossible boomerang cryptanalysis on LBlock by Min XIE, Yan-li MU

    Published 2017-05-01
    “…The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.A 15-round related-key impossible boomerang distinguisher was constructed.Based on the new distinguisher,an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end.The attack on 22-round LBlock required data complexity of only 2<sup>51.3</sup>plaintexts and computational complexity of about 2 <sup>71.54</sup>22-round encryptions.Compared with published cryptanalysis results on 22-round LBlock,proposed attack has great advantages on data and computational complexities.…”
    Get full text
    Article
  20. 20