Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2023
Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher
AbstractThe CLEFIA block cipher has a generalised Feistel structure, which has been an ISO international standard since 2012. In 2014 Su et al. proposed a white-box CLEFIA implementation with a white-box table for an S-box, and in 2020 Yao et al. ...
- research-articleJuly 2023
Improved attacks against reduced-round Whirlwind
Designs, Codes and Cryptography (DCAC), Volume 91, Issue 11Pages 3581–3602https://doi.org/10.1007/s10623-023-01254-0AbstractThe Whirlwind hash function was proposed by Barreto et al. (Des Codes Cryptogr 56(2–3):141–162, 2010, https://doi.org/10.1007/s10623-010-9391-y). In this paper, we focus on preimage and collision attacks on reduced-round Whirlwind. With the help ...
- research-articleJune 2023
Deep self-learning based dynamic secret key generation for novel secure and efficient hashing algorithm
Information Sciences: an International Journal (ISCI), Volume 629, Issue CPages 488–501https://doi.org/10.1016/j.ins.2023.02.007AbstractThe hash function is an efficient source of the integrity and authentication of input text and other data messages (image & audio-video) in the cryptography field. Existing hashing algorithms are time-consuming and vulnerable to ...
- research-articleDecember 2022
A modified secure hash design to circumvent collision and length extension attacks
Journal of Information Security and Applications (JISA), Volume 71, Issue Chttps://doi.org/10.1016/j.jisa.2022.103376AbstractThis paper introduces an improved version of the secure hash algorithms, SHA-1, and SHA-2. The proposed work produces a strengthened secure hash design using the fusion between the SHA-1 and SHA-2 hash standards. This design helps to ...
-
- research-articleAugust 2022
Bit-policy based chosen-plaintext collision attack on reused-mask AES
Journal of Information Security and Applications (JISA), Volume 68, Issue Chttps://doi.org/10.1016/j.jisa.2022.103222AbstractSide-channel collision attacks have shown good efficiency on breaking unprotected or reused-mask implementations of block ciphers. Depending on the relationship between “Hamming distance of values” and “average distance of traces”, ...
- ArticleNovember 2021
- ArticleAugust 2021
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
AbstractAt EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it into a constraint-based framework for finding exploitable MITM ...
- ArticleAugust 2021
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
AbstractIn this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the classical attacks for 31 and 27 steps. Both attacks adopt the ...
- ArticleAugust 2019
Efficient Collision Attack Frameworks for RIPEMD-160
AbstractRIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu, Mendel and Wang at Asiacrypt 2017 ...
- research-articleApril 2019
Cache timing attacks on NoC-based MPSoCs
Microprocessors & Microsystems (MSYS), Volume 66, Issue CPages 1–9https://doi.org/10.1016/j.micpro.2019.01.007AbstractRising demands for increased performance, lower energy consumption, connectivity and programming flexibility are nowadays driving the platforms, so-called Multi-Processor Systems-on-Chips (MPSoCs). These platforms are composed of ...
- ArticleNovember 2016
- ArticleApril 2015
Two Operands of Multipliers in Side-Channel Attack
COSADE 2015: Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064Pages 64–78https://doi.org/10.1007/978-3-319-21476-4_5The single-shot collision attack on RSA proposed by Hanleyï źetï źal. is studied focusing on the difference between two operands of multipliers. There are two consequences. Firstly, designing order of operands can be a cost-effective countermeasure.We ...
- ArticleMarch 2015
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
AbstractIn this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN). This attack is generic and works on 4-branch, Type-2 GFN ...
- articleMarch 2014
Internal differential collision attacks on the reduced-round GrØstl-0 hash function
Designs, Codes and Cryptography (DCAC), Volume 70, Issue 3Pages 251–271https://doi.org/10.1007/s10623-012-9674-6We analyze the GrØstl-0 hash function, that is the version of GrØstl submitted to the SHA-3 competition. This paper extends Peyrin's internal differential strategy, that uses differential paths between the permutations P and Q of GrØstl-0 to construct ...
- ArticleOctober 2014
Cryptanalysis of the Round-Reduced GOST Hash Function
AbstractThe GOST hash function, defined in GOST R 34.11-2012, was selected as the new Russian standard on August 7, 2012. It is designed to replace the old Russian standard GOST R 34.11-94. The GOST hash function is an AES-based primitive and is ...
- articleAugust 2013
First-order collision attack on protected NTRU cryptosystem
Microprocessors & Microsystems (MSYS), Volume 37, Issue 6-7Pages 601–609https://doi.org/10.1016/j.micpro.2013.04.008NTRU cryptosystem has been widely used in microsystems with low performance in computation. In 2010 Lee et al. gave several power analysis attacks on NTRU and three countermeasures, where they argued that only second-order power analysis can break their ...
- articleApril 2013
Preimage and pseudo-collision attacks on step-reduced SM3 hash function
Information Processing Letters (IPRL), Volume 113, Issue 8Pages 301–306https://doi.org/10.1016/j.ipl.2013.02.006SM3 [12] is the Chinese cryptographic hash standard which was announced in 2010 and designed by Wang et al. It is based on the Merkle-Damgard design and its compression function can be seen as a block cipher used in Davies-Meyer mode. It uses message ...