Results 151 to 160 of about 10,650 (191)
Some of the next articles are maybe not open access.

Related searches:

New results on quantum boomerang attacks

Quantum Information Processing, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hongkai Zou, Jian Zou, Yiyuan Luo
openaire   +3 more sources

The Retracing Boomerang Attack

2020
Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability \(p^2q^2\) (since each one of the properties has to be satisfied twice)
Orr Dunkelman   +3 more
openaire   +1 more source

Improved Boomerang Attacks on SM3

2013
The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features.
Bai, Dongxia   +3 more
openaire   +1 more source

New Boomerang Attacks on ARIA

2010
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Ewan Fleischmann   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy