نتایج جستجو برای: biclique cryptanalysis

تعداد نتایج: 12628  

1995
James L. Massey Gerhard Kramer Thomas Jakobsen

In this work we give some bounds which can be used to determine if a block cipher is secure against generalized linear cryptanalysis and partitioning cryptanalysis. For this purpose, we give a new de nition of imbalance which has some nice properties, and we show that an equivalent of Matsui's piling-up lemma holds for this de nition. The bounds are illustrated with examples. We prove that it s...

Journal: :IEICE Transactions on Information and Systems 2015

2012
Amir Abboud

1 1 Safe Zones: An Efficient Approach to Distributed Monitoring 3 1.1 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2.1 Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.2.2 Preliminaries: Minkowski Average . . . . . . . . . . . . . . . . . 8 1.3 Rela...

Journal: :International Journal of Bifurcation and Chaos 2006

2014
Hadi Soleimany

This paper aims to enhance the application of slide attack which is one of the most well-known cryptanalysis methods using selfsimilarity of a block cipher. The typical countermeasure against slide cryptanalysis is to use round-dependent constants. We present a new probabilistic technique and show how to overcome round-dependent constants in a slide attack against a block cipher based on the ge...

Journal: :Inf. Process. Lett. 2016
Oualid Benamara Fatiha Merazka

In this paper we present experiments in order to show how some pseudo random number generators can improve the effectiveness of a statistical cryptanalysis algorithm. We deduce mainly that a better generator enhance the accuracy of the cryptanalysis algorithm.

2004
Jean-Sébastien Coron David Naccache

We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt ’95. Our cryptanalysis enables a polynomial-time attacker to pass the identification protocol with probability one, without knowing the private key.

1994
Eli Biham

to linear cryptanalysis. We also described how to sum up characteristics (which also hold in diierential cryptanalysis). The iteration of this characteristic to seven rounds have probability 1=2 ? 2 ?11. A similar characteristic exist with a reverse order of the bytes in each word. From the tables in 9] we can see that about 4 2 112 = 2 24 known plaintexts are required to attack Feal-8, with su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید