Suchergebnisse - Cryptanalysis of Block Ciphers AND Hash Functions

  1. 1
  2. 2

    A Multi‐Image Cryptosystem Using Quantum Walks and Chebyshev Map von Abdullah M. Iliyasu, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif

    ISSN: 1076-2787, 1099-0526
    Veröffentlicht: Wiley 01.01.2021
    Veröffentlicht in Complexity (01.01.2021)
    Volltext
    Journal Article
  3. 3

    Survey on recent trends towards generalized differential and boomerang uniformities von Mesnager, Sihem, Mandal, Bimal, Msahli, Mounira

    ISSN: 1936-2447, 1936-2455
    Veröffentlicht: New York Springer US 01.07.2022
    Veröffentlicht in Cryptography and communications (01.07.2022)
    “… Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions …”
    Volltext
    Journal Article
  4. 4

    Non-isomorphic biclique cryptanalysis of full-round Crypton von Shakiba, Mohsen, Dakhilalian, Mohammad, Mala, Hamid

    ISSN: 0920-5489, 1872-7018
    Veröffentlicht: Elsevier B.V 01.09.2015
    Veröffentlicht in Computer standards and interfaces (01.09.2015)
    “… Biclique attack is one of the most recent cryptanalytic techniques which brings new tools from the area of hash functions to the area of block cipher cryptanalysis …”
    Volltext
    Journal Article
  5. 5

    Biclique cryptanalysis of LBlock and TWINE von Karakoç, F., Demirci, H., Harmancı, A.E.

    ISSN: 0020-0190, 1872-6119
    Veröffentlicht: Amsterdam Elsevier B.V 30.06.2013
    Veröffentlicht in Information processing letters (30.06.2013)
    “… In this paper, we present attacks on different number of rounds of these lightweight block ciphers by using the biclique cryptanalysis technique recently developed for cryptanalysis of the hash …”
    Volltext
    Journal Article
  6. 6

    Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function von Bozhong Liu, Zheng Gong, Xiaohong Chen, Weidong Qiu, Dong Zheng

    ISBN: 1424451426, 9781424451425
    Veröffentlicht: IEEE 01.08.2010
    “… 's efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al …”
    Volltext
    Tagungsbericht
  7. 7

    Classical and Quantum based Differential Cryptanalysis Methods von Jojan, Priyanka, Soni, Kapil Kumar, Rasool, Akhtar

    Veröffentlicht: IEEE 06.07.2021
    “… Linear cryptanalysis and differential cryptanalysis are general form cryptanalysis which is primarily applicable to block cipher, but also to stream ciphers and cryptographic hash functions …”
    Volltext
    Tagungsbericht
  8. 8

    Evaluation of the strength and performance of a new hashing algorithm based on a block cipher von Algazy, Kunbolat, Sakan, Kairat, Kapalova, Nursulu

    ISSN: 2088-8708, 2722-2578
    Veröffentlicht: 01.06.2023
    “… As a result, one round of the compression function was described as conjunctive normal form (CNF …”
    Volltext
    Journal Article
  9. 9

    Introduction to Cryptography von Padhye, Sahadeo, Sahu, Rajeev Anand, Saraswat, Vishal

    ISBN: 1138071536, 9781138071537, 9780367781019, 0367781018
    Veröffentlicht: Milton CRC Press 2018
    “… Preface Overview of Cryptography Introduction Goals of Cryptography Classification of Cryptosystem Practically Useful Cryptosystem Cryptanalysis Basic Algebra Group Ring Field Exercise Number Theory …”
    Volltext
    E-Book
  10. 10

    Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems von Chen, Yu-Ao, Gao, Xiao-Shan

    ISSN: 1009-6124, 1559-7067
    Veröffentlicht: Beijing Academy of Mathematics and Systems Science, Chinese Academy of Sciences 01.02.2022
    Veröffentlicht in Journal of systems science and complexity (01.02.2022)
    “… : The stream cipher Trivum, the block cipher AES, the hash function SHA-3/Keccak, the multivariate public key cryptosystems, and show that they are secure under quantum algebraic attack only if the corresponding condition numbers are large. This leads to a new criterion for designing such cryptosystems which are safe against the attack of quantum computers: The corresponding condition number …”
    Volltext
    Journal Article
  11. 11

    The Large Block Cipher Vistrutah von Avanzi, Roberto, Chakraborti, Avik, Chakraborty, Bishwajit, List, Eik

    ISSN: 2519-173X, 2519-173X
    Veröffentlicht: Ruhr-Universität Bochum 25.09.2025
    Veröffentlicht in IACR Transactions on Symmetric Cryptology (25.09.2025)
    “… Vistrutah is a block cipher with block sizes of 256 and 512 bits. It iterates a step function consisting of two AES rounds applied to each 128-bit block of the state, followed by a state-wide cell permutation …”
    Volltext
    Journal Article
  12. 12

    Improved Cryptanalysis of Reduced-Version QARMA-64/128 von Liu, Ya, Zang, Tiande, Gu, Dawu, Zhao, Fengyu, Li, Wei, Liu, Zhiqiang

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2020
    Veröffentlicht in IEEE access (2020)
    “… QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future …”
    Volltext
    Journal Article
  13. 13

    Quark: A Lightweight Hash von Aumasson, Jean-Philippe, Henzen, Luca, Meier, Willi, Naya-Plasencia, María

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer-Verlag 01.04.2013
    Veröffentlicht in Journal of cryptology (01.04.2013)
    “… The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols in RFID technology …”
    Volltext
    Journal Article
  14. 14

    Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks von Schrottenloher, André, Stevens, Marc

    ISSN: 2519-173X, 2519-173X
    Veröffentlicht: Ruhr Universität Bochum 19.09.2023
    Veröffentlicht in IACR Transactions on Symmetric Cryptology (19.09.2023)
    “… The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions …”
    Volltext
    Journal Article
  15. 15

    A multilevel qubit encryption mechanism using SHA-512 von Malik, Anjali, Jadav, Sunil, Gupta, Shailender

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.04.2024
    Veröffentlicht in Multimedia tools and applications (01.04.2024)
    “… One of the leading causes of concern with the advancement of cyber technologies is the increasing number of data and security breaches, especially given the …”
    Volltext
    Journal Article
  16. 16

    Learning and Experiencing Cryptography with CrypTool and SageMath von Esslinger, Bernhard

    ISBN: 9781685690182, 1685690181, 9781685690175, 1685690173
    Veröffentlicht: Norwood, MA Artech House 2023
    Volltext
    E-Book
  17. 17

    Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes von Dong, Le, Wang, Yanling, Wu, Wenling, Zou, Jian

    ISSN: 1751-8709, 1751-8717
    Veröffentlicht: The Institution of Engineering and Technology 01.09.2015
    Veröffentlicht in IET information security (01.09.2015)
    “… Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions …”
    Volltext
    Journal Article
  18. 18

    A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms von Aydin, Yilmaz, Garipcan, Ali Murat, Özkaynak, Fatih

    ISSN: 2193-567X, 1319-8025, 2191-4281
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2025
    Veröffentlicht in Arabian journal for science and engineering (2011) (01.01.2025)
    “… ), critical component in block cipher systems, is proposed. Unlike traditional methods providing low-level randomness, the proposed method utilizes physical true …”
    Volltext
    Journal Article
  19. 19

    Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things von Windarta, Susila, Suryadi, Suryadi, Ramli, Kalamullah, Lestari, Andriani Adi, Wildan, Wildan, Pranggono, Bernardi, Wardhani, Rini Wisnu

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 01.01.2023
    Veröffentlicht in IEEE access (01.01.2023)
    “… We present two lightweight hash functions, Alit-Hash and Tjuilik-Hash, based on the Saturnin block cipher and the Beetle mode of operation …”
    Volltext
    Journal Article
  20. 20

    Rotational Rebound Attacks on Reduced Skein von Khovratovich, Dmitry, Nikolić, Ivica, Rechberger, Christian

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: Boston Springer US 01.07.2014
    Veröffentlicht in Journal of cryptology (01.07.2014)
    “… It has been applied to several hash functions and block ciphers, including the new standard SHA-3 (Keccak …”
    Volltext
    Journal Article