Results 151 to 160 of about 10,588 (175)
Energy Landscape Theory of SARS-CoV-2 Complexes with Particulate Matter
Balzo GZd.
europepmc +1 more source
Neutron diffraction from a microgravity-grown crystal reveals the active site hydrogens of the internal aldimine form of tryptophan synthase. [PDF]
Drago VN +6 more
europepmc +1 more source
Public controversy and citizens' attitude formation about animal research: A case for scholarship and recommendations on conflicts at the science-society interface. [PDF]
Link E +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
New results on quantum boomerang attacks
Quantum Information Processing, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hongkai Zou, Jian Zou, Yiyuan Luo
openaire +1 more source
The Retracing Boomerang Attack
2020Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability \(p^2q^2\) (since each one of the properties has to be satisfied twice)
Orr Dunkelman +3 more
openaire +1 more source
Improved Boomerang Attacks on SM3
2013The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features.
Bai, Dongxia +3 more
openaire +1 more source
2010
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Ewan Fleischmann +3 more
openaire +1 more source
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Ewan Fleischmann +3 more
openaire +1 more source
New Related-Key Boomerang Attacks on AES
2008In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 218 chosen plaintexts and ciphertexts and needs 267.5 encryptions. We extend our attack to nine rounds of AES-192.
Michael Gorski, Stefan Lucks
openaire +1 more source

