Articles with "differential cryptanalysis" as a keyword



Photo by martinwyall from unsplash

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2808484

Abstract: Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model. Specifically, we propose a multiple impossible differentials attack of 8-round… read more here.

Keywords: round; round deoxys; impossible differential; differential cryptanalysis ... See more keywords
Photo by lgnwvr from unsplash

Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/15501329221119398

Abstract: Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most fundamental… read more here.

Keywords: differential cryptanalysis; anu; block; cryptanalysis ... See more keywords