[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

Cloak: A stream cipher based encryption protocol for mobile cloud computing

A Banerjee, M Hasan, MA Rahman… - IEEE Access, 2017 - ieeexplore.ieee.org
Mobile device and its applications have revolutionized the way we store and share data. It is
becoming a warehouse of users personal information. Unluckily, most of these data are …

ElimLin algorithm revisited

NT Courtois, P Sepehrdad, P Sušil… - International Workshop on …, 2012 - Springer
ElimLin is a simple algorithm for solving polynomial systems of multivariate equations over
small finite fields. It was initially proposed as a single tool by Courtois to attack DES. It can …

[PDF][PDF] Enhancing Hierocrypt-3 Performance by Modifying Its S-Box and Modes of Operations.

WI El Sobky, AR Mahmoud, AS Mohra… - J. Commun., 2020 - beng.stafpu.bu.edu.eg
Human relationships rely on trust, which is the reason that the authentication and related
digital signatures are the most complex and confusing areas of cryptography. The Massage …

Mini-ciphers: a reliable testbed for cryptanalysis?

J Nakahara, D Santana de Freitas - 2009 - drops.dagstuhl.de
This paper reports on higher-order square analysis of the AES cipher. We present
experimental results of attack simulations on mini-AES versions with word sizes of 3, 4, 5, 6 …

Algebraic cryptanalysis of a small-scale version of stream cipher Lex

V Velichkov, V Rijmen, B Preneel - IET Information Security, 2010 - IET
In this study, the authors analyse with respect to algebraic attacks a small-scale version of
the stream cipher Lex. They base it on a small-scale version of the block cipher advanced …

[PDF][PDF] Algebraic methods in block cipher cryptanalysis

RP Weinmann - 2009 - tuprints.ulb.tu-darmstadt.de
This thesis is a contribution to the field of algebraic cryptanalysis. Specifically the following
topics have been studied: We construct and analyze Feistel and SLN ciphers that have a …

[PDF][PDF] On the security of the Advanced Encryption Standard

PD Yacoumis - University of Adelaide, Adelaide, 2005 - ntcourtois.free.fr
On November 26, 2001, the block cipher Rijndael [19] was officially selected as the
Advanced Encryption Standard (AES) and published as FIPS 197 [1], following a 5-year …

Methods and tools for analysis of symmetric cryptographic primitives

O Kazymyrov - 2014 - bora.uib.no
The development of modern cryptography is associated with the emergence of computing
machines. Since specialized equipment for protection of sensitive information was initially …

[PDF][PDF] Performance evaluation of eXtended sparse linearization in GF (2) and GF (28)

T Kaptanoglu - 2007 - repository.rit.edu
Abstract XSL (eXtended Sparse Linearization) is a recent algebraic attack aimed at the
Advanced Encryption Standard. In order to shed some light into the behavior of the …