Journal articles on the topic 'Cryptanalysis attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptanalysis attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chu, Zhihui, Huaifeng Chen, Xiaoyun Wang, Xiaoyang Dong, and Lu Li. "Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/5160237.
Full textEddahmani, Said. "More than two decades of attacks on the AES cryptosystem." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 3 (2025): 667–83. https://doi.org/10.47974/jdmsc-1834.
Full textNobuyuki, Sugio. "Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK." IET Information Security 2023 (November 23, 2023): 1–12. http://dx.doi.org/10.1049/2023/6691726.
Full textHan, Guoyong, and Wenying Zhang. "Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7589306.
Full textLeander, Gregor, Shahram Rasoolzadeh, and Lukas Stennes. "Cryptanalysis of HALFLOOP Block Ciphers." IACR Transactions on Symmetric Cryptology 2023, no. 4 (2023): 58–82. http://dx.doi.org/10.46586/tosc.v2023.i4.58-82.
Full textHadipour, Hosein, and Yosuke Todo. "Cryptanalysis of QARMAv2." IACR Transactions on Symmetric Cryptology 2024, no. 1 (2024): 188–213. http://dx.doi.org/10.46586/tosc.v2024.i1.188-213.
Full textAlekseychuk, A. N. "Generalized differential-linear cryptanalysis of block cipher." Radiotekhnika, no. 204 (April 9, 2021): 5–15. http://dx.doi.org/10.30837/rt.2021.1.204.01.
Full textLI, SHUJUN, GUANRONG CHEN, and GONZALO ÁLVAREZ. "RETURN-MAP CRYPTANALYSIS REVISITED." International Journal of Bifurcation and Chaos 16, no. 05 (2006): 1557–68. http://dx.doi.org/10.1142/s0218127406015507.
Full textMuthavhine, Khumbelo Difference, and Mbuyu Sumbwanyambe. "Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (232)) and High Irreducible Polynomials." Applied Sciences 13, no. 23 (2023): 12834. http://dx.doi.org/10.3390/app132312834.
Full textZhou, Dawei, Huaifeng Chen, Rui Zong, and Ningning Song. "Zero-Correlation Linear Cryptanalysis on SPARX-64." Journal of Sensors 2021 (December 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/2193543.
Full textOladipupo, Esau Taiwo, and Oluwakemi Christiana Abikoye. "Modified Playfair cryptosystem for improved data security." Computer Science and Information Technologies 3, no. 1 (2022): 51–64. http://dx.doi.org/10.11591/csit.v3i1.p51-64.
Full textEsau Taiwo Oladipupo and Oluwakemi Christiana Abikoye. "Modified Playfair cryptosystem for improved data security." Computer Science and Information Technologies 3, no. 1 (2022): 51–64. http://dx.doi.org/10.11591/csit.v3i1.pp51-64.
Full textEsau, Taiwo Oladipupo, and Christiana Abikoye Oluwakemi. "Modified Playfair cryptosystem for improved data security." Computer Science and Information Technologies 3, no. 1 (2022): 51–64. https://doi.org/10.11591/csit.v3i1.pp51-64.
Full textJain, Ashish, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, and Partha Chakraborty. "A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption." Complexity 2023 (February 18, 2023): 1–9. http://dx.doi.org/10.1155/2023/7249127.
Full textKaptol, Yevheniy. "Quantum attack against post-quantum electronic signature complexity and implementation probability analysis." Physico-mathematical modelling and informational technologies, no. 32 (July 8, 2021): 136–40. http://dx.doi.org/10.15407/fmmit2021.32.136.
Full textDworak, Kamil, and Urszula Boryczka. "Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis." Entropy 23, no. 12 (2021): 1697. http://dx.doi.org/10.3390/e23121697.
Full textWei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.
Full textCourtois, Nicolas T. "CRYPTANALYSIS OF GOST IN THE MULTIPLE-KEY SCENARIO." Tatra Mountains Mathematical Publications 57, no. 1 (2013): 45–63. http://dx.doi.org/10.2478/tmmp-2013-0035.
Full textDossou-Yovo, Virgile, Abderrahmane Nitaj, and Alain Togbé. "Improved cryptanalysis of RSA." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 3 (2024): 945–61. http://dx.doi.org/10.47974/jdmsc-1570.
Full textCourtois, Nicolas T., Theodosis Mourouzis, Anna Grocholewska-Czuryło, and Jean-Jacques Quisquater. "On optimal size in truncated differential attacks." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 246–54. http://dx.doi.org/10.1556/012.2015.52.2.1314.
Full textSOLAK, ERCAN, CAHIT ÇOKAL, OLCAY TANER YILDIZ, and TÜRKER BIYIKOĞLU. "CRYPTANALYSIS OF FRIDRICH'S CHAOTIC IMAGE ENCRYPTION." International Journal of Bifurcation and Chaos 20, no. 05 (2010): 1405–13. http://dx.doi.org/10.1142/s0218127410026563.
Full textYang, Qianqian, Lei Hu, Danping Shi, Yosuke Todo, and Siwei Sun. "On the Complexity of Impossible Differential Cryptanalysis." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/7393401.
Full textSeok, Byoungjin. "Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT." Electronics 13, no. 20 (2024): 4053. http://dx.doi.org/10.3390/electronics13204053.
Full textMaleeva, G. A. "Analysis of partial key recovery attack on multivariate cryptographic transformations using rank systems." Radiotekhnika, no. 209 (June 24, 2022): 64–70. http://dx.doi.org/10.30837/rt.2022.2.209.06.
Full textAhmad, Musheer, and Hamed D. AlSharari. "Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map." International Journal of Rough Sets and Data Analysis 5, no. 4 (2018): 61–73. http://dx.doi.org/10.4018/ijrsda.2018100104.
Full textLi, Ming, Kanglei Zhou, Hua Ren, and Haiju Fan. "Cryptanalysis of Permutation–Diffusion-Based Lightweight Chaotic Image Encryption Scheme Using CPA." Applied Sciences 9, no. 3 (2019): 494. http://dx.doi.org/10.3390/app9030494.
Full textWageda, Alsobky, Saeed Hala, and N.Elwakeil Ali. "Different Types of Attacks on Block Ciphers." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 28–31. https://doi.org/10.35940/ijrte.C4214.099320.
Full textAbd Ghafar, Amir Hamzah. "AN UPDATED CRYPTANALYSIS ON THE BFHP-DLP SIGNING SCHEME." Malaysian Journal of Science 41 (September 30, 2022): 1–8. http://dx.doi.org/10.22452/mjs.sp2022no1.1.
Full textGrassi, Lorenzo, Katharina Koschatko, and Christian Rechberger. "Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails." IACR Transactions on Symmetric Cryptology 2025, no. 2 (2025): 34–86. https://doi.org/10.46586/tosc.v2025.i2.34-86.
Full textAlmukhlifi, Reham, and Poorvi L. Vora. "Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds." Cryptography 4, no. 1 (2020): 9. http://dx.doi.org/10.3390/cryptography4010009.
Full textRizk-Allah, Rizk M., Hatem Abdulkader, Samah S. Abd Elatif, Diego Oliva, Guillermo Sosa-Gómez, and Václav Snášel. "On the Cryptanalysis of a Simplified AES Using a Hybrid Binary Grey Wolf Optimization." Mathematics 11, no. 18 (2023): 3982. http://dx.doi.org/10.3390/math11183982.
Full textMuhammad, Faisal Nawaz, and Nawaz Yasir. "Redefining GCM’s resistance to cryptanalysis with offset mechanisms." Trends in Computer Science and Information Technology 9, no. 1 (2024): 042–51. http://dx.doi.org/10.17352/tcsit.000079.
Full textRasoolzadeh, Shahram, and Håvard Raddum. "Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of Katan." Tatra Mountains Mathematical Publications 67, no. 1 (2016): 149–66. http://dx.doi.org/10.1515/tmmp-2016-0037.
Full textXu, Zhichao, Hong Xu, Lin Tan, and Wenfeng Qi. "Differential-Linear Cryptanalysis of Reduced Round ChaCha." IACR Transactions on Symmetric Cryptology 2024, no. 2 (2024): 166–89. http://dx.doi.org/10.46586/tosc.v2024.i2.166-189.
Full textCao, Xinle, Jian Liu, Hao Lu, and Kui Ren. "Cryptanalysis of an encrypted database in SIGMOD '14." Proceedings of the VLDB Endowment 14, no. 10 (2021): 1743–55. http://dx.doi.org/10.14778/3467861.3467865.
Full textCarracedo, Jorge Martínez, and Adriana Suárez Corona. "Cryptanalysis of a Group Key Establishment Protocol." Symmetry 13, no. 2 (2021): 332. http://dx.doi.org/10.3390/sym13020332.
Full textDavydov, V. V., M. D. Pikhtovnikov, A. P. Kiryanova, and O. S. Zaikin. "Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 25, no. 3 (2025): 428–37. https://doi.org/10.17586/2226-1494-2025-25-3-428-437.
Full textJoseph, Mabin, Gautham Sekar, and R. Balasubramanian. "Side channel analysis of SPECK." Journal of Computer Security 28, no. 6 (2020): 655–76. http://dx.doi.org/10.3233/jcs-200021.
Full textAşkın Özdemir, Betül, Tim Beyne, and Vincent Rijmen. "Multidimensional Linear Cryptanalysis of Feistel Ciphers." IACR Transactions on Symmetric Cryptology 2023, no. 4 (2023): 1–27. http://dx.doi.org/10.46586/tosc.v2023.i4.1-27.
Full textZhao, Yuzhuo, Qiqin Shi, and Qun Ding. "Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos." Entropy 27, no. 1 (2025): 40. https://doi.org/10.3390/e27010040.
Full textPrema Sindhuri, B., and M. Kameswara Rao. "IoT security through web application firewall." International Journal of Engineering & Technology 7, no. 2.7 (2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.7.10259.
Full textQiao, Kexin, Junjie Cheng, and Changhai Ou. "A New Mixture Differential Cryptanalysis on Round-Reduced AES." Mathematics 10, no. 24 (2022): 4736. http://dx.doi.org/10.3390/math10244736.
Full textRahmani, Mohammed, Abderrahmane Nitaj, and Mhammed Ziane. "Improved Cryptanalysis of Some RSA Variants." Algorithms 18, no. 4 (2025): 223. https://doi.org/10.3390/a18040223.
Full textJha, Khushboo, Sumit Srivastava, and Aruna Jain. "Cryptanalysis of a Biometric based Anonymous Authentication Approach for IoT Environment." International Journal of Microsystems and IoT 2, no. 2 (2024): 591–97. https://doi.org/10.5281/zenodo.10804461.
Full textSaha, Ankita, Chanda Pathak, and Sourav Saha. "A Study of Machine Learning Techniques in Cryptography for Cybersecurity." American Journal of Electronics & Communication 1, no. 4 (2021): 22–26. http://dx.doi.org/10.15864/ajec.1404.
Full textHwang, Min-Shiang, Cheng-Ch Lee, and Shin-Jia Hwang. "Cryptanalysis of the Hwang-Shi Proxy Signature Scheme." Fundamenta Informaticae 53, no. 2 (2002): 131–34. https://doi.org/10.3233/fun-2002-53202.
Full textXie, Huiqin, Qiqing Xia, Ke Wang, Yanjun Li, and Li Yang. "Quantum Automated Tools for Finding Impossible Differentials." Mathematics 12, no. 16 (2024): 2598. http://dx.doi.org/10.3390/math12162598.
Full textHarmash, D. V. "Properties of the Rainbow multi-variant algorithm and its ability to resist various crypto-analysis methods and attack by outside channels." Radiotekhnika, no. 205 (July 2, 2021): 79–84. http://dx.doi.org/10.30837/rt.2021.2.205.07.
Full textAlzakari, Sarah A., and Poorvi L. Vora. "Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck." Cryptography 5, no. 1 (2020): 1. http://dx.doi.org/10.3390/cryptography5010001.
Full textAlmukhlifi, Reham, and Poorvi L. Vora. "Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds." Cryptography 7, no. 1 (2023): 8. http://dx.doi.org/10.3390/cryptography7010008.
Full text