Results 161 to 170 of about 10,387 (191)
An Asymmetric Impossible Boomerang Attack on 7-Round AES-128
Xiaoli Dong +3 more
openalex +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Retracing Boomerang Attack
2020Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability \(p^2q^2\) (since each one of the properties has to be satisfied twice)
Orr Dunkelman +3 more
openaire +2 more sources
Improved Boomerang Attacks on SM3
2013The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features.
Gaoli Wang +4 more
openaire +2 more sources
2010
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Stefan Lucks +3 more
openaire +1 more source
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Stefan Lucks +3 more
openaire +1 more source
A related-key boomerang distinguishing attack of Threefish-256
Wuhan University Journal of Natural Sciences, 2012The block cipher Threefish is the main component of Skein, which is based on ARX. Based on the efficient algorithms for calculating the differential of modular addition, we extend local collisions of Threefish-256 to more round by using related-key differential of addition in this paper.
Libin Wang, Zheng Gong, Shusheng Liu
openaire +2 more sources
Boomerang Attacks on Hash Function Using Auxiliary Differentials [PDF]
In this paper we study boomerang attacks in the chosen-key setting. This is particularly relevant to hash function analysis, since many boomerang attacks have been described against ARX-based designs. We present a new way to combine message modifications, or auxiliary differentials, with the boomerang attack.
Gaëtan Leurent, Arnab Roy
openaire +1 more source
New Related-Key Boomerang Attacks on AES
2008In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 218 chosen plaintexts and ciphertexts and needs 267.5 encryptions. We extend our attack to nine rounds of AES-192.
Michael Gorski, Stefan Lucks
openaire +2 more sources
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory, 2012In 2004, we introduced the related-key boomerang/ rectangle attacks, which allow us to enjoy the benefits of the boomerang attack and the related-key technique, simultaneously. The new attacks were used since then to attack numerous block ciphers. While the claimed applications are significant, most of them have a major drawback.
Orr Dunkelman +5 more
openaire +2 more sources

