نتایج جستجو برای: cryptanalysis

تعداد نتایج: 12443  

Journal: :Journal of Humanistic Mathematics 2018

Journal: :IACR Transactions on Symmetric Cryptology 2019

Journal: :DAIMI Report Series 1992

2012
Jean-Philippe Aumasson Gaëtan Leurent Willi Meier Florian Mendel Nicky Mouha Raphael C.-W. Phan Yu Sasaki Petr Susil

We introduce tuple cryptanalysis, a variant of structural cryptanalysis techniques as square, saturation, integral, internal collision, or multiset cryptanalysis, the main difference being that tuple cryptanalysis considers ordered rather than unordered multisets. This allows cryptanalysts to better trace structural properties within a cipher’s internal state. Unlike previous works that focus o...

Journal: :IACR Transactions on Symmetric Cryptology 2017

Journal: :Science China Information Sciences 2019

1997
Jacques Patarin Louis Goubin

In [12], T. Matsumoto and H. Imai designed an asymmetric cryptosystem, called C∗, for authentication, encryption and signature. This C∗ scheme was broken in [13] due to unexpected algebraic properties. In this paper, we study some new “candidate” asymmetric cryptosystems based on the idea of hiding one or two rounds of small S-box computations with secret functions of degree one or two. The pub...

Journal: :international journal of group theory 2015
claude carlet yin tan

we give a survey of recent applications of group rings to combinatorics and tocryptography, including their use in the di erential cryptanalysis of block ciphers.

Journal: :Inf. Process. Lett. 1995
Amr M. Youssef Stafford E. Tavares

In this letter, we study the marginal density of the XOR distribution table, and the linear approximation table entries of regular substitution boxes (s-boxes). Based on this, we show that the fraction of good s-boxes (with regard to immunity against linear and differential cryptanalysis) increases dramatically with the number of input variables. Introduction Differential cryptanalysis [1], and...

1998
Henri Gilbert Marc Girault Philippe Hoogvorst Fabrice Noilhan Thomas Pornin Guillaume Poupard Jacques Stern Serge Vaudenay

This report presents a response to the call for candidates issued by the National Institute for Standards and Technologies (the Advanced Encryption Standard project). The proposed candidate | called DFC as for \Decorrelated Fast Cipher" | is based on Vaudenay's decor-relation technique. This provides provable security against several classes of attacks which include the basic version of Biham a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید