We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 7,881 results
  1. An efficient permutation approach for SbPN-based symmetric block ciphers

    It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of...

    Mir Nazish, M. Tariq Banday, ... Sheena Banday in Cybersecurity
    Article Open access 05 October 2023
  2. A practical-quantum differential attack on block ciphers

    Differential attack is a basic cryptanalysis method for block ciphers that exploits the high probability relations between the input and output...

    Tarun Yadav, Manoj Kumar, ... S K Pal in Cryptography and Communications
    Article 01 July 2023
  3. Quantum resource estimation of PRINCE and Midori Block Ciphers

    With the continuous advancement of quantum technologies, the estimation of quantum resources necessary for quantum tasks becomes extremely important...

    Ausaf Hussain Akhlaq, Swamy Naidu Allu, Nagendar Yerukala in International Journal of Information Technology
    Article 15 June 2024
  4. On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices

    In the end of 2022 in Russian Federation recommendations for standardization were adopted defining a block ciphers mode of operation for...

    Georgii Firsov, Alisa Koreneva in Journal of Computer Virology and Hacking Techniques
    Article 03 June 2024
  5. Continuously non-malleable codes from block ciphers in split-state model

    Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve. It...

    Anit Kumar Ghosal, Dipanwita Roychowdhury in Cybersecurity
    Article Open access 01 October 2023
  6. Enabling power attack on traces of FPGA based block ciphers not acquired with start of encryption

    This paper describes a new technique to enable Correlation Power Analysis (CPA) attack on block ciphers executing on Field Programmable Gate Array...

    Arvind Kumar Singh, S. P. Mishra in International Journal of Information Technology
    Article 16 March 2023
  7. SCARE and power attack on AES-like block ciphers with secret S-box

    Despite Kerckhoff’s principle, there are secret ciphers with unknown components for diplomatic or military usages. The side-channel analysis of...

    **n Liu, An Wang, ... Zongyue Wang in Frontiers of Computer Science
    Article 16 November 2021
  8. Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra

    Integral cryptanalysis is one of the frequently-used cryptanalytic methods of symmetric-key primitives. With the help of division property and the...
    Yi Guo, Dan** Shi, ... Yin Lv in Information Security and Cryptology
    Conference paper 2024
  9. Towards accurate keyspace analysis of chaos-based image ciphers

    In recent years, there has been a surge in new chaos-based cryptographic algorithms, many of which claim to have unusually large keyspaces. Although...

    Abubakar Abba, Je Sen Teh, Moatsum Alawida in Multimedia Tools and Applications
    Article Open access 02 March 2024
  10. Structural evaluation of AES-like ciphers against mixture differential cryptanalysis

    At ASIACRYPT 2017, Rønjom et al. analyzed AES with the yoyo attack. Similar to their 4-round AES distinguisher, Grassi proposed the 4-round mixture...

    **aofeng **e, Tian Tian in Designs, Codes and Cryptography
    Article 05 August 2023
  11. Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon

    The use of deep learning techniques in cryptanalysis has garnered considerable interest following Gohr’s seminal work in 2019. Subsequent studies...
    Amirhossein Ebrahimi, David Gerault, Paolo Palmieri in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  12. Bounding the length of impossible differentials for SPN block ciphers

    Evaluating the security of a block cipher against impossible differential cryptanalysis, is an important aspect during the design process. The...

    Qian Wang, Chenhui ** in Designs, Codes and Cryptography
    Article 06 September 2021
  13. Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM

    Cryptographic algorithms classification, which can detect the underlying encryption algorithm on sufficient large ciphertexts, is essential to...
    Sijia Liu, Min Luo, ... Debiao He in Information and Communications Security
    Conference paper 2023
  14. Full round impossible differentials for Feistel ciphers

    In this paper a family of l round balanced Feistel ciphers with non-bijective functions F is being considered. For any such algorithm, the existence...

    Article 24 June 2023
  15. Output Prediction Attacks on Block Ciphers Using Deep Learning

    In this paper, we propose deep learning-based output prediction attacks in a blackbox setting. As preliminary experiments, we first focus on two toy...
    Hayato Kimura, Keita Emura, ... Toshihiro Ohigashi in Applied Cryptography and Network Security Workshops
    Conference paper 2022
  16. SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA

    Lightweight primitives have already received a lot of attention with the growth of resource-constrained devices, and many lightweight block ciphers...
    Yaxin Cui, Hong Xu, ... Wenfeng Qi in Information and Communications Security
    Conference paper 2023
  17. Feistel Ciphers Based on a Single Primitive

    We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the...
    Kento Tsuji, Tetsu Iwata in Cryptography and Coding
    Conference paper 2024
  18. Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers

    For block ciphers, Bogdanov et al. found that there are some linear approximations satisfying that their biases are deterministically invariant under...

    Wenqin Cao, Wentao Zhang in Cybersecurity
    Article Open access 01 October 2021
  19. BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers

    In this paper, we study the security of the Key-Alternating Feistel (KAF) ciphers, a class of key alternating ciphers with the Feistel structure,...

    Arghya Bhattacharjee, Ritam Bhaumik, ... Anik Raychaudhuri in Designs, Codes and Cryptography
    Article Open access 04 October 2023
  20. Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers

    Cryptanalysis of modern symmetric ciphers may be done by using linear equation systems with multiple right hand sides, which describe the encryption...

    Isaac A. Canales-Martínez, Igor Semaev in Designs, Codes and Cryptography
    Article 18 June 2024
Did you find what you were looking for? Share feedback.