Results 161 to 170 of about 10,636 (192)
Energy Landscape Theory of SARS-CoV-2 Complexes with Particulate Matter
Balzo GZd.
europepmc +1 more source
Public controversy and citizens' attitude formation about animal research: A case for scholarship and recommendations on conflicts at the science-society interface. [PDF]
Link E +7 more
europepmc +1 more source
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Ewan Fleischmann +3 more
openalex +2 more sources
New Related-Key Boomerang Attacks on AES.
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 218 chosen plaintexts and ciphertexts and needs 267.5 encryptions. We extend our attack to nine rounds of AES-192.
Michael Gorski, Stefan Lucks
openalex +2 more sources
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2
SHACAL-2 is a 64-round block cipher based on the compression function of the hash function standard SHA-256. It has a 256-bit block size and a variable length key of up to 512 bits. Up to now, all attacks on more than 37 rounds require at least 2235 bytes of memory.
Ewan Fleischmann +2 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
New results on quantum boomerang attacks
Quantum Information Processing, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hongkai Zou, Jian Zou, Yiyuan Luo
openaire +1 more source
The Retracing Boomerang Attack
2020Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability \(p^2q^2\) (since each one of the properties has to be satisfied twice)
Orr Dunkelman +3 more
openaire +1 more source

