Results 1 to 10 of about 51,661 (237)

SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. In this paper, we explore the problem of computing this table for a modular addition and the automatic search of boomerang ...
Dachao Wang, Baocang Wang, Siwei Sun
doaj   +2 more sources

On Boomerang Attacks on Quadratic Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers.
Xavier Bonnetain, Virginie Lallemand
doaj   +2 more sources

New Properties of the Double Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Qianqian Yang   +4 more
doaj   +2 more sources

A Formal Analysis of Boomerang Probabilities

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying ...
Andreas B. Kidmose, Tyge Tiessen
doaj   +2 more sources

Boomerang Sign in the Splenium of the Corpus Callosum After Vestibullar Schwannoma Treatment: Case Report and Review of the Literature [PDF]

open access: yesReports
Background and Clinical Significance: The term “boomerang sign” refers to a boomerang-shaped area of cytotoxic edema in the splenium of the corpus callosum. It is seen as hyperintense lesions on T2-weighted images, FLAIR and DWI in MRI.
Maciej Laskowski   +5 more
doaj   +2 more sources

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

open access: diamondIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +3 more sources

Supplemental nucleus pulposus allograft in patients with lumbar discogenic pain: results of a prospective feasibility study [PDF]

open access: yesBMC Musculoskeletal Disorders
Background Degeneration of the intervertebral disc is a significant source of chronic axial low back pain. Direct supplementation of degenerated nucleus pulposis (NP) tissue with intradiscally delivered allogeneic NP represents an opportunity to bridge ...
Douglas P. Beall   +9 more
doaj   +2 more sources

The Generative Mechanism of Boomerang Intention: From the Perspective of Legacy Identification

open access: yesFrontiers in Psychology, 2022
Boomerang employment has become an increasingly significant third way to obtain employees, yet little research has focused on why does ex-employee want to come back.
Zehui Tian   +3 more
doaj   +1 more source

Throwing Boomerangs into Feistel Structures

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure is
Hosein Hadipour   +2 more
doaj   +1 more source

Improved Rectangle Attacks on SKINNY and CRAFT

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy