نتایج جستجو برای: lblock

تعداد نتایج: 48  

2012
Shengbao Wu Mingsheng Wang

Impossible differential cryptanalysis is a powerful technique to recover the secret key of block ciphers by exploiting the fact that in block ciphers specific input and output differences are not compatible. This paper introduces a novel tool to search truncated impossible differentials for word-oriented block ciphers with bijective Sboxes. Our tool generalizes the earlier U-method and the UID-...

2007
M. Z. Matondang H. Haron

Research on solid model reconstruction has been started since 1970s and it is still investigated since then. In other fields of research, it also takes important role such as in fields as diverse as product design, engineering and rapid prototyping, medical imaging and artistic applications. Furthermore, it has turned out to be essential needs. This paper presents a new algorithm in reconstruct...

2016
Alex Biryukov Daniel Dinu Johann Großschädl

Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” cryptographic primitive for the IoT is a highly challenging task due to the resource constraints of IoT devices and the variety of primitives. An important criterion to assess the suitability of a lightweight cipher w...

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

Journal: :IACR transaction on symmetric cryptology 2021

The introduction of the automatic search boosts cryptanalysis symmetric-key primitives to some degree. However, performance is not always satisfactory for long trails or ciphers with large state sizes. Compared extensive attention on enhancement mixed integer linear programming (MILP) method, few works care acceleration Boolean satisfiability problem (SAT) modulo theories (SMT) method. This pap...

2015
Petr SUŠIL

Deterministic symmetric encryption is widely used in many cryptographic applications. The security of deterministic block and stream ciphers is evaluated using cryptanalysis. Cryptanalysis is divided into two main categories: statistical cryptanalysis and algebraic cryptanalysis. Statistical cryptanalysis is a powerful tool for evaluating the security but it often requires a large number of pla...

2012
Pouyan SEPEHRDAD

Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks,...

2015
Siwei Sun Lei Hu Meiqin Wang Peng Wang Kexin Qiao Xiaoshuang Ma Danping Shi Ling Song Kai Fu

In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the differential and linear behavior of a wide range of block ciphers. We point out that the differential behavior of an arbitrary S-box can be exactly described by a small system of linear inequalities. Based on this observation and MILP technique, we propose an automatic method for finding high probability ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید