Suchergebnisse - Cryptanalysis of Block Ciphers AND Hash Functions
-
1
Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme
ISSN: 2078-2489Veröffentlicht: MDPI AG 11.07.2024Veröffentlicht in Information (11.07.2024)Volltext
Journal Article -
2
A Multi‐Image Cryptosystem Using Quantum Walks and Chebyshev Map
ISSN: 1076-2787, 1099-0526Veröffentlicht: Wiley 01.01.2021Veröffentlicht in Complexity (01.01.2021)Volltext
Journal Article -
3
Survey on recent trends towards generalized differential and boomerang uniformities
ISSN: 1936-2447, 1936-2455Veröffentlicht: New York Springer US 01.07.2022Veröffentlicht in Cryptography and communications (01.07.2022)“… Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions …”
Volltext
Journal Article -
4
Non-isomorphic biclique cryptanalysis of full-round Crypton
ISSN: 0920-5489, 1872-7018Veröffentlicht: Elsevier B.V 01.09.2015Veröffentlicht in Computer standards and interfaces (01.09.2015)“… Biclique attack is one of the most recent cryptanalytic techniques which brings new tools from the area of hash functions to the area of block cipher cryptanalysis …”
Volltext
Journal Article -
5
Biclique cryptanalysis of LBlock and TWINE
ISSN: 0020-0190, 1872-6119Veröffentlicht: Amsterdam Elsevier B.V 30.06.2013Veröffentlicht in Information processing letters (30.06.2013)“… In this paper, we present attacks on different number of rounds of these lightweight block ciphers by using the biclique cryptanalysis technique recently developed for cryptanalysis of the hash …”
Volltext
Journal Article -
6
Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function
ISBN: 1424451426, 9781424451425Veröffentlicht: IEEE 01.08.2010Veröffentlicht in 2010 International Conference on Internet Technology and Applications (01.08.2010)“… 's efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al …”
Volltext
Tagungsbericht -
7
Classical and Quantum based Differential Cryptanalysis Methods
Veröffentlicht: IEEE 06.07.2021Veröffentlicht in 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (06.07.2021)“… Linear cryptanalysis and differential cryptanalysis are general form cryptanalysis which is primarily applicable to block cipher, but also to stream ciphers and cryptographic hash functions …”
Volltext
Tagungsbericht -
8
Evaluation of the strength and performance of a new hashing algorithm based on a block cipher
ISSN: 2088-8708, 2722-2578Veröffentlicht: 01.06.2023Veröffentlicht in International journal of electrical and computer engineering (Malacca, Malacca) (01.06.2023)“… As a result, one round of the compression function was described as conjunctive normal form (CNF …”
Volltext
Journal Article -
9
Introduction to Cryptography
ISBN: 1138071536, 9781138071537, 9780367781019, 0367781018Veröffentlicht: Milton CRC Press 2018“… Preface Overview of Cryptography Introduction Goals of Cryptography Classification of Cryptosystem Practically Useful Cryptosystem Cryptanalysis Basic Algebra Group Ring Field Exercise Number Theory …”
Volltext
E-Book -
10
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
ISSN: 1009-6124, 1559-7067Veröffentlicht: Beijing Academy of Mathematics and Systems Science, Chinese Academy of Sciences 01.02.2022Veröffentlicht in Journal of systems science and complexity (01.02.2022)“… : The stream cipher Trivum, the block cipher AES, the hash function SHA-3/Keccak, the multivariate public key cryptosystems, and show that they are secure under quantum algebraic attack only if the corresponding condition numbers are large. This leads to a new criterion for designing such cryptosystems which are safe against the attack of quantum computers: The corresponding condition number …”
Volltext
Journal Article -
11
The Large Block Cipher Vistrutah
ISSN: 2519-173X, 2519-173XVeröffentlicht: Ruhr-Universität Bochum 25.09.2025Veröffentlicht in IACR Transactions on Symmetric Cryptology (25.09.2025)“… Vistrutah is a block cipher with block sizes of 256 and 512 bits. It iterates a step function consisting of two AES rounds applied to each 128-bit block of the state, followed by a state-wide cell permutation …”
Volltext
Journal Article -
12
Improved Cryptanalysis of Reduced-Version QARMA-64/128
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2020Veröffentlicht in IEEE access (2020)“… QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future …”
Volltext
Journal Article -
13
Quark: A Lightweight Hash
ISSN: 0933-2790, 1432-1378Veröffentlicht: New York Springer-Verlag 01.04.2013Veröffentlicht in Journal of cryptology (01.04.2013)“… The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols in RFID technology …”
Volltext
Journal Article -
14
Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks
ISSN: 2519-173X, 2519-173XVeröffentlicht: Ruhr Universität Bochum 19.09.2023Veröffentlicht in IACR Transactions on Symmetric Cryptology (19.09.2023)“… The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions …”
Volltext
Journal Article -
15
A multilevel qubit encryption mechanism using SHA-512
ISSN: 1573-7721, 1380-7501, 1573-7721Veröffentlicht: New York Springer US 01.04.2024Veröffentlicht in Multimedia tools and applications (01.04.2024)“… One of the leading causes of concern with the advancement of cyber technologies is the increasing number of data and security breaches, especially given the …”
Volltext
Journal Article -
16
Learning and Experiencing Cryptography with CrypTool and SageMath
ISBN: 9781685690182, 1685690181, 9781685690175, 1685690173Veröffentlicht: Norwood, MA Artech House 2023Volltext
E-Book -
17
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes
ISSN: 1751-8709, 1751-8717Veröffentlicht: The Institution of Engineering and Technology 01.09.2015Veröffentlicht in IET information security (01.09.2015)“… Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions …”
Volltext
Journal Article -
18
A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms
ISSN: 2193-567X, 1319-8025, 2191-4281Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2025Veröffentlicht in Arabian journal for science and engineering (2011) (01.01.2025)“… ), critical component in block cipher systems, is proposed. Unlike traditional methods providing low-level randomness, the proposed method utilizes physical true …”
Volltext
Journal Article -
19
Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 01.01.2023Veröffentlicht in IEEE access (01.01.2023)“… We present two lightweight hash functions, Alit-Hash and Tjuilik-Hash, based on the Saturnin block cipher and the Beetle mode of operation …”
Volltext
Journal Article -
20
Rotational Rebound Attacks on Reduced Skein
ISSN: 0933-2790, 1432-1378Veröffentlicht: Boston Springer US 01.07.2014Veröffentlicht in Journal of cryptology (01.07.2014)“… It has been applied to several hash functions and block ciphers, including the new standard SHA-3 (Keccak …”
Volltext
Journal Article

