Results 151 to 160 of about 10,588 (175)
Some of the next articles are maybe not open access.

Related searches:

New results on quantum boomerang attacks

Quantum Information Processing, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hongkai Zou, Jian Zou, Yiyuan Luo
openaire   +1 more source

The Retracing Boomerang Attack

2020
Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability \(p^2q^2\) (since each one of the properties has to be satisfied twice)
Orr Dunkelman   +3 more
openaire   +1 more source

Improved Boomerang Attacks on SM3

2013
The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features.
Bai, Dongxia   +3 more
openaire   +1 more source

New Boomerang Attacks on ARIA

2010
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Ewan Fleischmann   +3 more
openaire   +1 more source

New Related-Key Boomerang Attacks on AES

2008
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 218 chosen plaintexts and ciphertexts and needs 267.5 encryptions. We extend our attack to nine rounds of AES-192.
Michael Gorski, Stefan Lucks
openaire   +1 more source

Home - About - Disclaimer - Privacy