Results 161 to 170 of about 10,636 (192)

New Boomerang Attacks on ARIA

open access: closed, 2010
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Ewan Fleischmann   +3 more
openalex   +2 more sources

New Related-Key Boomerang Attacks on AES.

open access: closed, 2008
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 218 chosen plaintexts and ciphertexts and needs 267.5 encryptions. We extend our attack to nine rounds of AES-192.
Michael Gorski, Stefan Lucks
openalex   +2 more sources

Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2

open access: closed, 2009
SHACAL-2 is a 64-round block cipher based on the compression function of the hash function standard SHA-256. It has a 256-bit block size and a variable length key of up to 512 bits. Up to now, all attacks on more than 37 rounds require at least 2235 bytes of memory.
Ewan Fleischmann   +2 more
openalex   +2 more sources

New results on quantum boomerang attacks

Quantum Information Processing, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hongkai Zou, Jian Zou, Yiyuan Luo
openaire   +1 more source

The Retracing Boomerang Attack

2020
Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability \(p^2q^2\) (since each one of the properties has to be satisfied twice)
Orr Dunkelman   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy