[图书][B] Cryptographic Boolean functions and applications
TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …
comprehensive reference for the use of Boolean functions in modern cryptography. While …
Cloak: A stream cipher based encryption protocol for mobile cloud computing
Mobile device and its applications have revolutionized the way we store and share data. It is
becoming a warehouse of users personal information. Unluckily, most of these data are …
becoming a warehouse of users personal information. Unluckily, most of these data are …
ElimLin algorithm revisited
NT Courtois, P Sepehrdad, P Sušil… - International Workshop on …, 2012 - Springer
ElimLin is a simple algorithm for solving polynomial systems of multivariate equations over
small finite fields. It was initially proposed as a single tool by Courtois to attack DES. It can …
small finite fields. It was initially proposed as a single tool by Courtois to attack DES. It can …
[PDF][PDF] Enhancing Hierocrypt-3 Performance by Modifying Its S-Box and Modes of Operations.
WI El Sobky, AR Mahmoud, AS Mohra… - J. Commun., 2020 - beng.stafpu.bu.edu.eg
Human relationships rely on trust, which is the reason that the authentication and related
digital signatures are the most complex and confusing areas of cryptography. The Massage …
digital signatures are the most complex and confusing areas of cryptography. The Massage …
Mini-ciphers: a reliable testbed for cryptanalysis?
J Nakahara, D Santana de Freitas - 2009 - drops.dagstuhl.de
This paper reports on higher-order square analysis of the AES cipher. We present
experimental results of attack simulations on mini-AES versions with word sizes of 3, 4, 5, 6 …
experimental results of attack simulations on mini-AES versions with word sizes of 3, 4, 5, 6 …
Algebraic cryptanalysis of a small-scale version of stream cipher Lex
In this study, the authors analyse with respect to algebraic attacks a small-scale version of
the stream cipher Lex. They base it on a small-scale version of the block cipher advanced …
the stream cipher Lex. They base it on a small-scale version of the block cipher advanced …
[PDF][PDF] Algebraic methods in block cipher cryptanalysis
RP Weinmann - 2009 - tuprints.ulb.tu-darmstadt.de
This thesis is a contribution to the field of algebraic cryptanalysis. Specifically the following
topics have been studied: We construct and analyze Feistel and SLN ciphers that have a …
topics have been studied: We construct and analyze Feistel and SLN ciphers that have a …
[PDF][PDF] On the security of the Advanced Encryption Standard
PD Yacoumis - University of Adelaide, Adelaide, 2005 - ntcourtois.free.fr
On November 26, 2001, the block cipher Rijndael [19] was officially selected as the
Advanced Encryption Standard (AES) and published as FIPS 197 [1], following a 5-year …
Advanced Encryption Standard (AES) and published as FIPS 197 [1], following a 5-year …
Methods and tools for analysis of symmetric cryptographic primitives
O Kazymyrov - 2014 - bora.uib.no
The development of modern cryptography is associated with the emergence of computing
machines. Since specialized equipment for protection of sensitive information was initially …
machines. Since specialized equipment for protection of sensitive information was initially …
[PDF][PDF] Performance evaluation of eXtended sparse linearization in GF (2) and GF (28)
T Kaptanoglu - 2007 - repository.rit.edu
Abstract XSL (eXtended Sparse Linearization) is a recent algebraic attack aimed at the
Advanced Encryption Standard. In order to shed some light into the behavior of the …
Advanced Encryption Standard. In order to shed some light into the behavior of the …