CRYPTANALYSIS

作品数:157被引量:262H指数:8
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:王美琴更多>>
相关机构:电子科技大学河北工业大学山东大学清华大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划北京市自然科学基金国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Full-round impossible diferential attack on shadow block cipher
《Cybersecurity》2025年第1期247-261,共15页Yuting Liu Yongqiang Li Huiqin Chen Mingsheng Wang 
supported by the National Natural Science Foundation of China(No.12371525).
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources.Its goal is to ensure the security of data transmission through resource-constrained devices.Impossible diferential c...
关键词:Lightweight block cipher SHADOW Impossible diferential cryptanalysis SAT 
Cryptanalysis of DBST, a lightweight block cipher
《Frontiers of Computer Science》2024年第4期219-221,共3页Sadegh SADEGHI Nasour BAGHERI 
Shahid Rajaee Teacher Training University(Grant No.4968).
1 Introduction Conventional cryptographic primitives are not suitable for resource-constrained environments.Consequently,numerous lightweight primitives have been proposed over the past decade,specifically tailored fo...
关键词:structure. PRIMITIVE branch 
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles
《Chinese Physics B》2024年第4期254-257,共4页高甘 
Project supported by the Offline Course Program of“Experiment of College Physics”in the 2022-year Anhui Provincial Quality Engineering Program (Grant No.2022xxkc134);the Program for Academic Leader Reserve Candidates in Tongling University (Grant Nos.2020tlxyxs43 and 2014tlxyxs30);the Talent Scientific Research Foundation of Tongling University (Grant No.2015tlxyrc01);the 2014 year Program for Excellent Youth Talents in University of Anhui Province。
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three...
关键词:security loophole rearranging orders semi-quantum secret sharing single particles 
Improved differential-neural cryptanalysis for round-reduced SIMECK32/64被引量:1
《Frontiers of Computer Science》2023年第6期187-189,共3页Liu ZHANG Jinyu LU Zilong WANG Chao LI 
supported by the National Natural Science Foundation of China(Grant Nos.62172319,62172427);the Fundamental Research Funds for the Central Universities(No.QTZX23090);the Postgraduate Scientific Research Innovation Project of Hunan Province(No.CX20220016).
1 Introduction In CRYPTO 2019,Gohr[1]innovatively integrated deep learning with differential cryptanalysis,specifically applied to SPECK32/64,resulting in the development of a neural distinguisher(ND)that outperforms ...
关键词:NEURAL DIFFERENTIAL analysis 
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
《Computer Systems Science & Engineering》2023年第8期2401-2414,共14页Mohammed S.Alshehri Sultan Almakdi Mimonah Al Qathrady Jawad Ahmad 
The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RG/SERC/11/4).
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp...
关键词:CRYPTANALYSIS hyperchaotic map image encryption chosen-plaintext attack CRYPTOSYSTEM 
Cryptanalysis of Full-Round Magpie Block Cipher被引量:1
《Chinese Journal of Electronics》2023年第2期217-224,共8页YANG Yunxiao SUN Bing LIU Guoqiang 
supported by the National Natural Science Foundation of China(61772545,61702537,62002370);State Key Laboratory of Information Security(2020-MS-02).
Magpie is a lightweight block cipher proposed by Li et al.in Acta Electronica Sinica volumn 45,issue 10.It adopts an substitution-permutation network(SPN)structure with a block size of 64 bits and the key size of 96 b...
关键词:Block cipher Differential cryptanalysis Weak key Active S-boxes MAGPIE 
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
《Intelligent Automation & Soft Computing》2023年第4期929-955,共27页Lamiaa A.Abou Elazm Walid El-Shafai Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie 
Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R66),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the secur...
关键词:Information security cancellable biometric recognition systems CRYPTANALYSIS 3D chaotic map ENCRYPTION FPGA 
Deep-learning-based cryptanalysis of two types of nonlinear optical cryptosystems
《Chinese Physics B》2022年第9期293-300,共8页Xiao-Gang Wang Hao-Yu Wei 
Project supported by the National Natural Science Foundation of China(Grant Nos.61975185 and 61575178);the Natural Science Foundation of Zhejiang Province,China(Grant No.LY19F030004);the Scientific Research and Development Fund of Zhejiang University of Science and Technology,China(Grant No.F701108L03).
The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mec...
关键词:optical encryption nonlinear optical cryptosystem deep learning phase retrieval algorithm 
Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security被引量:1
《Computers, Materials & Continua》2022年第6期4971-4988,共18页Sumaira Azhar Naveed Ahmed Azam Umar Hayat 
This research is funded through JSPS KAKENHI Grant Number 18J23484,QAU-URF 2015;HEC project NRPU-7433.
The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks.We propose a novel three-step text encryption scheme that has provable securit...
关键词:Text encryption pell numbers elliptic curves key sensitivity statistical cryptanalysis 
SCENERY:a lightweight block cipher based on Feistel structure被引量:2
《Frontiers of Computer Science》2022年第3期193-202,共10页Jingya FENG Lang LI 
This research was supported by the Scientific Research Fund of Hunan Provincial Education Department(19A072);Application-oriented Special Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469);the Science and Technology Plan Project of Hunan Province(2016TP1020).
In this paper,we propose a new lightweight block cipher called SCENERY.The main purpose of SCENERY design applies to hardware and software platforms.SCENERY is a 64-bit block cipher supporting 80-bit keys,and its data...
关键词:lightweight block cipher feistel structure CRYPTANALYSIS internet of things 
检索报告 对象比较 聚类工具 使用帮助 返回顶部