-
1
Survey on approaches of stream cipher cryptanalysis
Published 2022-11-01Subjects: “…linear distinguishing cryptanalysis…”
Get full text
Article -
2
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01Subjects: Get full text
Article -
3
Gröbner Basis Cryptanalysis of Ciminion and Hydra
Published 2025-03-01“…With the Gröbner basis we can simplify cryptanalysis, as we no longer need to impose genericity assumptions to derive complexity estimates. …”
Get full text
Article -
4
Impossible differential cryptanalysis of Saturnin algorithm
Published 2022-03-01Get full text
Article -
5
-
6
Differential-linear cryptanalysis of PRINCE cipher
Published 2021-08-01Subjects: “…differential-linear cryptanalysis…”
Get full text
Article -
7
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
Published 2020-06-01Subjects: “…Ant Colony Optimization (ACO), Cryptanalysis, Genetic Algorithm (GA), Shrinking Generator, Stream Cipher.…”
Get full text
Article -
8
Optical Cryptanalysis Method Using Wavefront Shaping
Published 2017-01-01“…The development of cryptanalysis strategies will also have a positive promotion for the cryptosystems themselves. …”
Get full text
Article -
9
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Subjects: Get full text
Article -
10
Integral cryptanalysis on reduce-round SAILFISH-I
Published 2025-03-01“…Abstract SAILFISH-I, first proposed by Agarwal et al. in 2022, is a lightweight block cipher with a typical Feistel structure, which is evaluated for the first time in this paper for its resistance to integral cryptanalysis. Firstly, the S-box and the overall structure are modeled based on the MILP method. …”
Get full text
Article -
11
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Get full text
Article -
12
-
13
Related-key impossible boomerang cryptanalysis on TWINE
Published 2019-09-01“…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
Get full text
Article -
14
New Quantum Cryptanalysis of Binary Elliptic Curves
Published 2025-03-01Subjects: Get full text
Article -
15
ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS
Published 2023-12-01Subjects: “…algebraic cryptanalysis…”
Get full text
Article -
16
-
17
Quantum cryptanalysis of lightweight block cipher Piccolo
Published 2023-06-01Subjects: “…quantum cryptanalysis…”
Get full text
Article -
18
Automated Differential-Linear Cryptanalysis for AND-RX Ciphers
Published 2024-01-01“…Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. …”
Get full text
Article -
19
Related-key impossible boomerang cryptanalysis on LBlock
Published 2017-05-01“…The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.A 15-round related-key impossible boomerang distinguisher was constructed.Based on the new distinguisher,an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end.The attack on 22-round LBlock required data complexity of only 2<sup>51.3</sup>plaintexts and computational complexity of about 2 <sup>71.54</sup>22-round encryptions.Compared with published cryptanalysis results on 22-round LBlock,proposed attack has great advantages on data and computational complexities.…”
Get full text
Article -
20
Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli
Published 2025-06-01Subjects: Get full text
Article