Cryptanalysis of two schemes of Baba et al. by linear algebra methods

10/21/2019
by   V. Roman'kov, et al.
0

We show that the attacks based on the linear decomposition method introduced by the author and the span-method introduced by Tsaban allow one to find the transmitted message in the cryptosystem and the exchanged key in the protocol which are proposed by Baba et al.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/03/2021

Estimation of underreporting in Brazilian tuberculosis data, 2012-2014

Analysis of burden of underregistration in tuberculosis data in Brazil, ...
research
10/28/2020

Higher Order Linear Transformer

Following up on the linear transformer part of the article from Katharop...
research
05/22/2018

New Instantiations of the CRYPTO 2017 Masking Schemes

At CRYPTO 2017, Belaïd et al presented two new private multiplication al...
research
01/28/2022

Discriminating Defense Against DDoS Attacks; a Novel Approach

A recent paper (circa 2020) by Osterwile et al., entitled "21 Years of D...
research
01/24/2018

An Algebraic Approach for Reasoning About Information Flow

This paper concerns the analysis of information leaks in security system...
research
09/22/2022

Evaluating undercounts in epidemics: response to Maruotti et al. 2022

Maruotti et al. 2022 used a mark-recapture approach to estimate bounds o...
research
12/14/2019

Some group-theoretical results on Feistel Networks in a long-key scenario

The study of the trapdoors that can be hidden in a block cipher is and h...

Please sign up or login with your details

Forgot password? Click here to reset