The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose new mathematical models of splitting attacks targeted at two major consensus protocols applied in cryptocurrencies. Obtained upper bounds of probability of successful fork maintenance by an attacker allows to get estimates on block expectation number for securing the system against splitting attacks.
This paper presents improvement of the high nonlinear S-boxes generation method by the appropriate selection of the criteria application order which decreases the required computation power for S-box generation. The proposed modification allows generation of a byte S-box with nonlinearity 104, algebraic immunity 3 and maximum of difference distribution table 8 within approximately 30 minutes of a...
Many modern ciphers have a substitution-permutation (SP) network as a main component. This design is well researched in relation to Advanced Encryption Standard (AES). One of the ways to improve the security of cryptographic primitives is the use of additional nonlinear layers. However, this replacement may not have any effect against particular cryptanalytic attacks. In this paper we use algebraic...
An exact value of round functions collision probability for 3-round Feistel network is derived. The upper bound of algorithm execution complexity for distinguishing Feistel network from a random permutation is given.
The extension of the known method of estimation of the minimal number of active S-boxes in the differential or linear characteristic of Rijndael-like symmetric block ciphers is proposed. Variant of Rijndael cipher with modified linear transformation which provides better diffusion is offered.
The analysis of existing requirements for MDS matrices that are used in block ciphers is performed, the most important requirements are selected, and matrix corresponding to the selected requirements is constructed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.