Recovery-key attacks against TMN-family framework for mobile wireless networks

TSD Phuc, YH Shin, C Lee - KSII Transactions on Internet and …, 2021 - koreascience.kr
The proliferation of the Internet of Things (IoT) technologies and applications, especially the
rapid rise in the use of mobile devices, from individuals to organizations, has led to the …

Distinguishing attack on SDDO-based block cipher BMD-128

J Kang, K Jeong, C Lee, S Hong - Ubiquitous Information Technologies …, 2014 - Springer
Abstract BMD-128 is a 128-bit block cipher with a 256-bit secret key and is based on
switchable data-dependent operations. By using these operators, this algorithm was …

[PDF][PDF] Related-Key Amplified Boomerang Attack on Full-Round MM-128

H Eom, B Seok, C Lee - HUMAN-CENTRIC COMPUTING AND …, 2023 - hcisj.com
Recently, the use of open platforms with various network functions and hardware interfaces
has been increasing in various fields such as the Internet of Things, smart buildings, and …

Cryptanalysis of the XO-64 Suitable for Wireless Systems

TSD Phuc, NN Xiong, C Lee - Wireless Personal Communications, 2017 - Springer
Data-dependent operations (DDOs) that were introduced by Moldovyan in 2003 (Moldovyan
in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int …

Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets

TSD Phuc, C Lee - Symmetry, 2018 - mdpi.com
BM123-64 block cipher, which was proposed by Minh, NH and Bac, DT in 2014, was
designed for high speed communication applications factors. It was constructed in hybrid …

[PDF][PDF] Cobra-H64/128 算法的相关密钥-差分攻击

罗伟, 郭建胜 - 电子学报, 2013 - ejournal.org.cn
本文研究了Cobra-H64/128 分组密码算法在相关密钥-差分攻击下的安全性. 针对Cobra-H64
算法, 利用新构造的相关密钥-差分路径和CP 逆变换存在的信息泄露规律给出攻击算法1 …

New block ciphers for wireless moblile netwoks

PM Tuan, B Do Thi, MN Hieu, N Do Thanh - International Conference on …, 2016 - Springer
Abstract Wireless Mobile Networks (WMNs) play a fundamental role in the activities of each
individual and organization. However, they have a number of limitations about hardware …

Related-key amplified boomerang attacks on KT-64 and MD-64 suitable for wireless sensor networks

J Kang, K Jeong, S Hong, C Lee - Sensor Letters, 2013 - ingentaconnect.com
KT-64 and MD-64 are hardware-optimized 64-bit block ciphers which are based on data-
dependent operations. They provide high performance in FPGA implementation, which are …

[PDF][PDF] MD-64 算法的相关密钥-矩形攻击

郭建胜, 崔竞一, 罗伟, 刘翼鹏 - 电子与信息学报, 2015 - jeit.ac.cn
该文针对MD-64 分组密码算法在相关密钥-矩形攻击下的安全性进行了研究.
分析了算法中高次DDO (Data Dependent Operations) 结构, SPN 结构在输入差分重量为1 …

[PDF][PDF] CIKS-128 分组算法的相关密钥-差分攻击

郭建胜, 崔竞一, 罗伟, 刘翼鹏 - 电子学报, 2016 - ejournal.org.cn
分析研究了CIKS-128 分组密码算法在相关密钥-差分攻击下的安全性. 利用DDP
结构和非线性函数的差分信息泄漏规律构造了一条高概率相关密钥-差分特征, 并给出攻击算法 …