Results 161 to 170 of about 10,588 (175)
Some of the next articles are maybe not open access.
A related-key boomerang distinguishing attack of Threefish-256
Wuhan University Journal of Natural Sciences, 2012The block cipher Threefish is the main component of Skein, which is based on ARX. Based on the efficient algorithms for calculating the differential of modular addition, we extend local collisions of Threefish-256 to more round by using related-key differential of addition in this paper.
Shusheng Liu, Libin Wang, Zheng Gong
openaire +1 more source
Related-Key Boomerang Attacks on KATAN32/48/64
2013KATAN/KTANTAN is a family of hardware oriented block ciphers proposed at CHES 2009. Although the KTANTAN family have been broken by a meet-in-the-middle approach, the KATAN family are secure at present. In this paper, we investigate the KATAN family in the related-key boomerang framework with several techniques.
Takanori Isobe, Yu Sasaki, Jiageng Chen
openaire +1 more source
Revisiting the Boomerang Attack From a Perspective of 3-Differential
IEEE Transactions on Information TheoryzbMATH Open Web Interface contents unavailable due to conflicting licenses.
Libo Wang +4 more
openaire +1 more source
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
2018This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
openaire +1 more source
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2
2009SHACAL-2 is a 64-round block cipher based on the compression function of the hash function standard SHA-256. It has a 256-bit block size and a variable length key of up to 512 bits. Up to now, all attacks on more than 37 rounds require at least 2235 bytes of memory.
Ewan Fleischmann +2 more
openaire +1 more source

