Výsledky vyhledávání - Cryptanalysis of Block Ciphers and Hash Functions
-
1
Compact and Low-Latency FPGA-Based Number Theoretic Transform Architecture for CRYSTALS Kyber Postquantum Cryptography Scheme
ISSN: 2078-2489Vydáno: MDPI AG 11.07.2024Vydáno v Information (11.07.2024)Získat plný text
Journal Article -
2
A Multi‐Image Cryptosystem Using Quantum Walks and Chebyshev Map
ISSN: 1076-2787, 1099-0526Vydáno: Wiley 01.01.2021Vydáno v Complexity (01.01.2021)Získat plný text
Journal Article -
3
Survey on recent trends towards generalized differential and boomerang uniformities
ISSN: 1936-2447, 1936-2455Vydáno: New York Springer US 01.07.2022Vydáno v Cryptography and communications (01.07.2022)“…Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions…”
Získat plný text
Journal Article -
4
Non-isomorphic biclique cryptanalysis of full-round Crypton
ISSN: 0920-5489, 1872-7018Vydáno: Elsevier B.V 01.09.2015Vydáno v Computer standards and interfaces (01.09.2015)“… Biclique attack is one of the most recent cryptanalytic techniques which brings new tools from the area of hash functions to the area of block cipher cryptanalysis…”
Získat plný text
Journal Article -
5
Biclique cryptanalysis of LBlock and TWINE
ISSN: 0020-0190, 1872-6119Vydáno: Amsterdam Elsevier B.V 30.06.2013Vydáno v Information processing letters (30.06.2013)“… In this paper, we present attacks on different number of rounds of these lightweight block ciphers by using the biclique cryptanalysis technique recently developed for cryptanalysis of the hash…”
Získat plný text
Journal Article -
6
Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function
ISBN: 1424451426, 9781424451425Vydáno: IEEE 01.08.2010Vydáno v 2010 International Conference on Internet Technology and Applications (01.08.2010)“…'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al…”
Získat plný text
Konferenční příspěvek -
7
Classical and Quantum based Differential Cryptanalysis Methods
Vydáno: IEEE 06.07.2021Vydáno v 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (06.07.2021)“… Linear cryptanalysis and differential cryptanalysis are general form cryptanalysis which is primarily applicable to block cipher, but also to stream ciphers and cryptographic hash functions…”
Získat plný text
Konferenční příspěvek -
8
Evaluation of the strength and performance of a new hashing algorithm based on a block cipher
ISSN: 2088-8708, 2722-2578Vydáno: 01.06.2023Vydáno v International journal of electrical and computer engineering (Malacca, Malacca) (01.06.2023)“… As a result, one round of the compression function was described as conjunctive normal form (CNF…”
Získat plný text
Journal Article -
9
Introduction to Cryptography
ISBN: 1138071536, 9781138071537, 9780367781019, 0367781018Vydáno: Milton CRC Press 2018“… Preface Overview of Cryptography Introduction Goals of Cryptography Classification of Cryptosystem Practically Useful Cryptosystem Cryptanalysis Basic Algebra Group Ring Field Exercise Number Theory…”
Získat plný text
E-kniha -
10
Rotational Rebound Attacks on Reduced Skein
ISSN: 0933-2790, 1432-1378Vydáno: Boston Springer US 01.07.2014Vydáno v Journal of cryptology (01.07.2014)“… It has been applied to several hash functions and block ciphers, including the new standard SHA-3 (Keccak…”
Získat plný text
Journal Article -
11
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
ISSN: 1009-6124, 1559-7067Vydáno: Beijing Academy of Mathematics and Systems Science, Chinese Academy of Sciences 01.02.2022Vydáno v Journal of systems science and complexity (01.02.2022)“…: The stream cipher Trivum, the block cipher AES, the hash function SHA-3/Keccak, the multivariate public key cryptosystems, and show that they are secure under quantum algebraic attack only if the corresponding condition numbers are large. This leads to a new criterion for designing such cryptosystems which are safe against the attack of quantum computers: The corresponding condition number…”
Získat plný text
Journal Article -
12
The Large Block Cipher Vistrutah
ISSN: 2519-173X, 2519-173XVydáno: Ruhr-Universität Bochum 25.09.2025Vydáno v IACR Transactions on Symmetric Cryptology (25.09.2025)“…Vistrutah is a block cipher with block sizes of 256 and 512 bits. It iterates a step function consisting of two AES rounds applied to each 128-bit block of the state, followed by a state-wide cell permutation…”
Získat plný text
Journal Article -
13
Improved Cryptanalysis of Reduced-Version QARMA-64/128
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2020Vydáno v IEEE access (2020)“…QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future…”
Získat plný text
Journal Article -
14
Quark: A Lightweight Hash
ISSN: 0933-2790, 1432-1378Vydáno: New York Springer-Verlag 01.04.2013Vydáno v Journal of cryptology (01.04.2013)“…The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by professionals, notably to implement cryptographic protocols in RFID technology…”
Získat plný text
Journal Article -
15
Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks
ISSN: 2519-173X, 2519-173XVydáno: Ruhr Universität Bochum 19.09.2023Vydáno v IACR Transactions on Symmetric Cryptology (19.09.2023)“…The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions…”
Získat plný text
Journal Article -
16
A multilevel qubit encryption mechanism using SHA-512
ISSN: 1573-7721, 1380-7501, 1573-7721Vydáno: New York Springer US 01.04.2024Vydáno v Multimedia tools and applications (01.04.2024)“…One of the leading causes of concern with the advancement of cyber technologies is the increasing number of data and security breaches, especially given the…”
Získat plný text
Journal Article -
17
Learning and Experiencing Cryptography with CrypTool and SageMath
ISBN: 9781685690182, 1685690181, 9781685690175, 1685690173Vydáno: Norwood, MA Artech House 2023Získat plný text
E-kniha -
18
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes
ISSN: 1751-8709, 1751-8717Vydáno: The Institution of Engineering and Technology 01.09.2015Vydáno v IET information security (01.09.2015)“…Generalised Feistel network (GFN) is a popular design for block ciphers and hash functions…”
Získat plný text
Journal Article -
19
A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms
ISSN: 2193-567X, 1319-8025, 2191-4281Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2025Vydáno v Arabian journal for science and engineering (2011) (01.01.2025)“…), critical component in block cipher systems, is proposed. Unlike traditional methods providing low-level randomness, the proposed method utilizes physical true…”
Získat plný text
Journal Article -
20
Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 01.01.2023Vydáno v IEEE access (01.01.2023)“… We present two lightweight hash functions, Alit-Hash and Tjuilik-Hash, based on the Saturnin block cipher and the Beetle mode of operation…”
Získat plný text
Journal Article

