Výsledky vyhledávání - Cryptanalysis of Block Ciphers and Hash Functions

  1. 1
  2. 2
  3. 3

    Survey on recent trends towards generalized differential and boomerang uniformities Autor Mesnager, Sihem, Mandal, Bimal, Msahli, Mounira

    ISSN: 1936-2447, 1936-2455
    Vydáno: New York Springer US 01.07.2022
    Vydáno v Cryptography and communications (01.07.2022)
    “…Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions…”
    Získat plný text
    Journal Article
  4. 4

    Non-isomorphic biclique cryptanalysis of full-round Crypton Autor Shakiba, Mohsen, Dakhilalian, Mohammad, Mala, Hamid

    ISSN: 0920-5489, 1872-7018
    Vydáno: Elsevier B.V 01.09.2015
    Vydáno v Computer standards and interfaces (01.09.2015)
    “… Biclique attack is one of the most recent cryptanalytic techniques which brings new tools from the area of hash functions to the area of block cipher cryptanalysis…”
    Získat plný text
    Journal Article
  5. 5

    Biclique cryptanalysis of LBlock and TWINE Autor Karakoç, F., Demirci, H., Harmancı, A.E.

    ISSN: 0020-0190, 1872-6119
    Vydáno: Amsterdam Elsevier B.V 30.06.2013
    Vydáno v Information processing letters (30.06.2013)
    “… In this paper, we present attacks on different number of rounds of these lightweight block ciphers by using the biclique cryptanalysis technique recently developed for cryptanalysis of the hash…”
    Získat plný text
    Journal Article
  6. 6

    Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function Autor Bozhong Liu, Zheng Gong, Xiaohong Chen, Weidong Qiu, Dong Zheng

    ISBN: 1424451426, 9781424451425
    Vydáno: IEEE 01.08.2010
    “…'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Classical and Quantum based Differential Cryptanalysis Methods Autor Jojan, Priyanka, Soni, Kapil Kumar, Rasool, Akhtar

    Vydáno: IEEE 06.07.2021
    “… Linear cryptanalysis and differential cryptanalysis are general form cryptanalysis which is primarily applicable to block cipher, but also to stream ciphers and cryptographic hash functions…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    Evaluation of the strength and performance of a new hashing algorithm based on a block cipher Autor Algazy, Kunbolat, Sakan, Kairat, Kapalova, Nursulu

    ISSN: 2088-8708, 2722-2578
    Vydáno: 01.06.2023
    “… As a result, one round of the compression function was described as conjunctive normal form (CNF…”
    Získat plný text
    Journal Article
  9. 9

    Introduction to Cryptography Autor Padhye, Sahadeo, Sahu, Rajeev Anand, Saraswat, Vishal

    ISBN: 1138071536, 9781138071537, 9780367781019, 0367781018
    Vydáno: Milton CRC Press 2018
    “… Preface Overview of Cryptography Introduction Goals of Cryptography Classification of Cryptosystem Practically Useful Cryptosystem Cryptanalysis Basic Algebra Group Ring Field Exercise Number Theory…”
    Získat plný text
    E-kniha
  10. 10

    Rotational Rebound Attacks on Reduced Skein Autor Khovratovich, Dmitry, Nikolić, Ivica, Rechberger, Christian

    ISSN: 0933-2790, 1432-1378
    Vydáno: Boston Springer US 01.07.2014
    Vydáno v Journal of cryptology (01.07.2014)
    “… It has been applied to several hash functions and block ciphers, including the new standard SHA-3 (Keccak…”
    Získat plný text
    Journal Article
  11. 11

    Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems Autor Chen, Yu-Ao, Gao, Xiao-Shan

    ISSN: 1009-6124, 1559-7067
    Vydáno: Beijing Academy of Mathematics and Systems Science, Chinese Academy of Sciences 01.02.2022
    “…: The stream cipher Trivum, the block cipher AES, the hash function SHA-3/Keccak, the multivariate public key cryptosystems, and show that they are secure under quantum algebraic attack only if the corresponding condition numbers are large. This leads to a new criterion for designing such cryptosystems which are safe against the attack of quantum computers: The corresponding condition number…”
    Získat plný text
    Journal Article
  12. 12

    The Large Block Cipher Vistrutah Autor Avanzi, Roberto, Chakraborti, Avik, Chakraborty, Bishwajit, List, Eik

    ISSN: 2519-173X, 2519-173X
    Vydáno: Ruhr-Universität Bochum 25.09.2025
    “…Vistrutah is a block cipher with block sizes of 256 and 512 bits. It iterates a step function consisting of two AES rounds applied to each 128-bit block of the state, followed by a state-wide cell permutation…”
    Získat plný text
    Journal Article
  13. 13

    Improved Cryptanalysis of Reduced-Version QARMA-64/128 Autor Liu, Ya, Zang, Tiande, Gu, Dawu, Zhao, Fengyu, Li, Wei, Liu, Zhiqiang

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2020
    Vydáno v IEEE access (2020)
    “…QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future…”
    Získat plný text
    Journal Article
  14. 14

    Quark: A Lightweight Hash Autor Aumasson, Jean-Philippe, Henzen, Luca, Meier, Willi, Naya-Plasencia, María

    ISSN: 0933-2790, 1432-1378
    Vydáno: New York Springer-Verlag 01.04.2013
    Vydáno v Journal of cryptology (01.04.2013)
    “…The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols in RFID technology…”
    Získat plný text
    Journal Article
  15. 15

    Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks Autor Schrottenloher, André, Stevens, Marc

    ISSN: 2519-173X, 2519-173X
    Vydáno: Ruhr Universität Bochum 19.09.2023
    “…The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions…”
    Získat plný text
    Journal Article
  16. 16

    A multilevel qubit encryption mechanism using SHA-512 Autor Malik, Anjali, Jadav, Sunil, Gupta, Shailender

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Vydáno: New York Springer US 01.04.2024
    Vydáno v Multimedia tools and applications (01.04.2024)
    “…One of the leading causes of concern with the advancement of cyber technologies is the increasing number of data and security breaches, especially given the…”
    Získat plný text
    Journal Article
  17. 17

    Learning and Experiencing Cryptography with CrypTool and SageMath Autor Esslinger, Bernhard

    ISBN: 9781685690182, 1685690181, 9781685690175, 1685690173
    Vydáno: Norwood, MA Artech House 2023
    Získat plný text
    E-kniha
  18. 18

    Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes Autor Dong, Le, Wang, Yanling, Wu, Wenling, Zou, Jian

    ISSN: 1751-8709, 1751-8717
    Vydáno: The Institution of Engineering and Technology 01.09.2015
    Vydáno v IET information security (01.09.2015)
    “…Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions…”
    Získat plný text
    Journal Article
  19. 19

    A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms Autor Aydin, Yilmaz, Garipcan, Ali Murat, Özkaynak, Fatih

    ISSN: 2193-567X, 1319-8025, 2191-4281
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2025
    “…), critical component in block cipher systems, is proposed. Unlike traditional methods providing low-level randomness, the proposed method utilizes physical true…”
    Získat plný text
    Journal Article
  20. 20

    Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things Autor Windarta, Susila, Suryadi, Suryadi, Ramli, Kalamullah, Lestari, Andriani Adi, Wildan, Wildan, Pranggono, Bernardi, Wardhani, Rini Wisnu

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 01.01.2023
    Vydáno v IEEE access (01.01.2023)
    “… We present two lightweight hash functions, Alit-Hash and Tjuilik-Hash, based on the Saturnin block cipher and the Beetle mode of operation…”
    Získat plný text
    Journal Article