Výsledky vyhledávání - Cryptanalysis of Block Ciphers and Hash Functions*
-
1
Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme
ISSN: 2078-2489Vydáno: MDPI AG 11.07.2024Vydáno v Information (11.07.2024)Získat plný text
Journal Article -
2
A Multi‐Image Cryptosystem Using Quantum Walks and Chebyshev Map
ISSN: 1076-2787, 1099-0526Vydáno: Wiley 01.01.2021Vydáno v Complexity (01.01.2021)Získat plný text
Journal Article -
3
Survey on recent trends towards generalized differential and boomerang uniformities
ISSN: 1936-2447, 1936-2455Vydáno: New York Springer US 01.07.2022Vydáno v Cryptography and communications (01.07.2022)“…Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions…”
Získat plný text
Journal Article -
4
Introduction to Cryptography with Open-Source Software
ISBN: 143982570X, 9781439825709, 1439825718, 9781439825716Vydáno: Boca Raton, FL CRC Press 2011“…This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. It enables students to run their own…”
Získat plný text
E-kniha Kniha -
5
Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function
ISBN: 1424451426, 9781424451425Vydáno: IEEE 01.08.2010Vydáno v 2010 International Conference on Internet Technology and Applications (01.08.2010)“…'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al…”
Získat plný text
Konferenční příspěvek -
6
Biclique cryptanalysis of LBlock and TWINE
ISSN: 0020-0190, 1872-6119Vydáno: Amsterdam Elsevier B.V 30.06.2013Vydáno v Information processing letters (30.06.2013)“… In this paper, we present attacks on different number of rounds of these lightweight block ciphers by using the biclique cryptanalysis technique recently developed for cryptanalysis of the hash…”
Získat plný text
Journal Article -
7
Non-isomorphic biclique cryptanalysis of full-round Crypton
ISSN: 0920-5489, 1872-7018Vydáno: Elsevier B.V 01.09.2015Vydáno v Computer standards and interfaces (01.09.2015)“… Biclique attack is one of the most recent cryptanalytic techniques which brings new tools from the area of hash functions to the area of block cipher cryptanalysis…”
Získat plný text
Journal Article -
8
Classical and Quantum based Differential Cryptanalysis Methods
Vydáno: IEEE 06.07.2021Vydáno v 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (06.07.2021)“… Linear cryptanalysis and differential cryptanalysis are general form cryptanalysis which is primarily applicable to block cipher, but also to stream ciphers and cryptographic hash functions…”
Získat plný text
Konferenční příspěvek -
9
Introduction to Cryptography
ISBN: 1138071536, 9781138071537, 9780367781019, 0367781018Vydáno: Milton CRC Press 2018“… Preface Overview of Cryptography Introduction Goals of Cryptography Classification of Cryptosystem Practically Useful Cryptosystem Cryptanalysis Basic Algebra Group Ring Field Exercise Number Theory…”
Získat plný text
E-kniha -
10
INTEGRAL DISTINGUISHERS OF JH AND GRφSTL-512
ISSN: 0217-9822Vydáno: Graduate University of Chinese Academy of Sciences, Beijing 100049, China 2012Vydáno v 电子科学学刊(英文版) (2012)“… permutations.Because some properties reflect the pseudo-randomness of the structures.Moreover,they help us to find new cryptanalysis for some block cipher…”
Získat plný text
Journal Article -
11
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
ISSN: 1009-6124, 1559-7067Vydáno: Beijing Academy of Mathematics and Systems Science, Chinese Academy of Sciences 01.02.2022Vydáno v Journal of systems science and complexity (01.02.2022)“…: The stream cipher Trivum, the block cipher AES, the hash function SHA-3/Keccak, the multivariate public key cryptosystems, and show that they are secure under quantum algebraic attack only if the corresponding condition numbers are large. This leads to a new criterion for designing such cryptosystems which are safe against the attack of quantum computers: The corresponding condition number…”
Získat plný text
Journal Article -
12
Rotational Rebound Attacks on Reduced Skein
ISSN: 0933-2790, 1432-1378Vydáno: Boston Springer US 01.07.2014Vydáno v Journal of cryptology (01.07.2014)“… It has been applied to several hash functions and block ciphers, including the new standard SHA-3 (Keccak…”
Získat plný text
Journal Article -
13
Fast Software Encryption
ISSN: 0161-1194, 1558-1586Vydáno: West Point Taylor & Francis Inc 01.01.2001Vydáno v Cryptologia (01.01.2001)“…The workshop is devoted to all aspects of fast, secret key ciphers, including the design and cryptanalysis of block and stream ciphers in addition to hash functions…”
Získat plný text
Journal Article -
14
New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
ISBN: 9780780385153, 0780385152Vydáno: Piscataway NJ IEEE 2004Vydáno v 2004 IEEE International Conference on Evolutionary Computation (2004)“…Recently, a simple way of creating very efficient distinguishers for cryptographic primitives such as block ciphers or hash functions, was presented by the authors…”
Získat plný text
Konferenční příspěvek -
15
How to distinguish between a block cipher and a random permutation by lowering the input entropy
ISBN: 0780366360, 9780780366367“…A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is explained…”Vydáno: IEEE 2001
Získat plný text
Konferenční příspěvek -
16
New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA
ISSN: 0288-3635, 1882-7055Vydáno: 01.01.2005Vydáno v New generation computing (01.01.2005)Získat plný text
Journal Article -
17
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 06.08.2018Vydáno v arXiv.org (06.08.2018)“… We apply our quantum algorithm for solving Boolean equations to the cryptanalysis of several important cryptosystems…”
Získat plný text
Paper -
18
Second edition of Stinson crypto book
ISSN: 0161-1194, 1558-1586Vydáno: West Point Taylor & Francis Inc 01.04.2003Vydáno v Cryptologia (01.04.2003)“…; Explains both linear and differential cryptanalysis; Presents the Random Oracle model for hash functions; and much more…”
Získat plný text
Journal Article -
19
Analysis of ARX round functions in secure hash functions
ISBN: 9781124553146, 1124553142Vydáno: ProQuest Dissertations & Theses 01.01.2011“…A new design paradigm for symmetric-key design primitives, such as hash functions and block ciphers, is the Addition-Rotation-XOR (ARX) paradigm…”
Získat plný text
Dissertation -
20
Security Assessment of Selected Cryptographic Symmetric-Key Primitives
ISBN: 9798480658101Vydáno: ProQuest Dissertations & Theses 01.01.2013“… It is in this context that cryptanalysis is the subfield of cryptography which is concerned with assessing the security of the suggested systems, possibly “certifying“ or “breaking…”
Získat plný text
Dissertation

