We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,632 results
  1. Correlation Cube Attack Revisited

    In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. certain “special” index set of cube (ISoC). This...
    Jianhua Wang, Lu Qin, Baofeng Wu in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  2. A New Correlation Cube Attack Based on Division Property

    Correlation cube attacks were proposed by Liu et al. at EUROCRYPT 2018, which targeted a modern symmetric-key cryptosystem based on nonlinear...
    Cheng Che, Tian Tian in Information Security and Privacy
    Conference paper 2023
  3. Cube attack on stream cipher E0: revisited

    To investigate the process of cube attack in the world of wireless networks, Nikolaos Petrakos modeled E0 encryption function and implemented cube...

    Kakumani K. C. Deepthi, Kunwar Singh, Sai Karthikeya Konduru in International Journal of Information Technology
    Article 09 May 2022
  4. Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak

    Since the announcement of the NIST call for a new lightweight cryptographic standard, a lot of schemes have been proposed in response. Xoodyak is one...
    Mohammad Vaziri, Vesselin Velichkov in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  5. Security Analysis of WAGE Against Division Property Based Cube Attack

    In recent years, as more Internet of Things (IoT) devices are connected to the internet, lightweight cryptography has become more and more important....
    Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury in Information Security Practice and Experience
    Conference paper 2023
  6. Fourteen years of cube attacks

    Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a...

    Marco Cianfriglia, Elia Onofri, ... Marco Pedicini in Applicable Algebra in Engineering, Communication and Computing
    Article Open access 04 May 2023
  7. Batch medical image encryption using 3D Latin cube-based simultaneous permutation and diffusion

    Nowadays, numerous encryption schemes have been proposed in response to the growing concerns regarding the security of individuals’ health...

    Wei Song, Chong Fu, ... Chiu-Wing Sham in Signal, Image and Video Processing
    Article 27 January 2024
  8. Cube Attacks on Round-Reduced Grain-128AEAD

    Lightweight cryptography aims to design secure and efficient cryptographic algorithms for resource-constrained devices. Traditional cryptographic...
    Wil Liam Teng, Iftekhar Salam, ... Jia Yew Teh in Emerging Technologies in Computing
    Conference paper 2024
  9. Multiple remote sensing image encryption scheme based on saliency extraction and magic cube circular motion

    To improve the salient region security and transmission efficiency of remote sensing images, a multiple remote sensing image (MRSIs) encryption...

    Chang Cai, Yu Wang, ... Jun Mou in Applied Intelligence
    Article 01 April 2024
  10. Key Filtering in Cube Attacks from the Implementation Aspect

    In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms...
    Hao Fan, Yonglin Hao, ... Lin Jiao in Cryptology and Network Security
    Conference paper 2023
  11. RISE: Rubik’s cube and image segmentation based secure medical images encryption

    Despite the ease of digital image distribution, storage, and replication, averting identity theft, privacy breaches, and ownership issues can be...

    Kunal Demla, Ashima Anand in Multimedia Tools and Applications
    Article 02 February 2024
  12. More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities

    The key step of the cube attack is to recover the special polynomial, the superpoly, of the target cipher. In particular, the balanced superpoly, in...
    Hao Lei, Jiahui He, ... Meiqin Wang in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  13. Equitable [[2, 10], [6, 6]]-partitions of the 12-cube

    We describe the computer-aided classification of equitable partitions of the 12-cube with quotient matrix [[2, 10], [6, 6]], or, equivalently, simple...

    Denis S. Krotov in Cryptography and Communications
    Article 26 April 2024
  14. An Experimentally Verified Attack on 820-Round Trivium

    The cube attack is one of the most important cryptanalytic techniques against Trivium. As the method of recovering superpolies becomes more and more...
    Cheng Che, Tian Tian in Information Security and Cryptology
    Conference paper 2023
  15. Piecewise symmetric magic cube: application to text cryptography

    This article propounds a Piecewise Symmetric Magic Cube (PSMC), the properties of which have reinvigorated its application to text encryption. A...

    Narbda Rani, Vinod Mishra, Birmohan Singh in Multimedia Tools and Applications
    Article 23 November 2022
  16. Strengthening wavelet based image steganography using Rubik’s cube segmentation and secret image scrambling

    Image steganography is an extremely rich and significant exploration region that gives productive answers to some genuine and modern issues. This...

    Jyoti Khandelwal, Vijay Kumar Sharma in Multimedia Tools and Applications
    Article 29 February 2024
  17. Fast image encryption based on new cascade chaotic system and Rubik’s cube strategy

    The strength and effectiveness of a chaotic image cryptosystem are closely related to the complexity of the used chaotic maps. This paper first...

    Hongxiang Zhao, Shucui **e, Jianzhong Zhang in Multimedia Tools and Applications
    Article 24 October 2023
  18. A lightweight image encryption algorithm based on patterns in Rubik’s revenge cube

    Typical security confirmation for a cryptographic protocol correlates its resilience to a specific attack to assure the hardness of some mathematical...

    Awais Yousaf, Abdul Razaq, Hira Baig in Multimedia Tools and Applications
    Article 31 March 2022
  19. Conditional Cube Attacks on Full Members of KNOT-AEAD Family

    KNOT is a family of permutation-based lightweight AEAD and hashing algorithms, which is submitted to the NIST Lightweight Cryptography...
    Siwei Chen, Zejun **ang, ... Shasha Zhang in Information and Communications Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.