Results 161 to 170 of about 10,588 (175)
Some of the next articles are maybe not open access.

A related-key boomerang distinguishing attack of Threefish-256

Wuhan University Journal of Natural Sciences, 2012
The block cipher Threefish is the main component of Skein, which is based on ARX. Based on the efficient algorithms for calculating the differential of modular addition, we extend local collisions of Threefish-256 to more round by using related-key differential of addition in this paper.
Shusheng Liu, Libin Wang, Zheng Gong
openaire   +1 more source

Related-Key Boomerang Attacks on KATAN32/48/64

2013
KATAN/KTANTAN is a family of hardware oriented block ciphers proposed at CHES 2009. Although the KTANTAN family have been broken by a meet-in-the-middle approach, the KATAN family are secure at present. In this paper, we investigate the KATAN family in the related-key boomerang framework with several techniques.
Takanori Isobe, Yu Sasaki, Jiageng Chen
openaire   +1 more source

Revisiting the Boomerang Attack From a Perspective of 3-Differential

IEEE Transactions on Information Theory
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Libo Wang   +4 more
openaire   +1 more source

Improved Related-Tweakey Boomerang Attacks on Deoxys-BC

2018
This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
openaire   +1 more source

Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2

2009
SHACAL-2 is a 64-round block cipher based on the compression function of the hash function standard SHA-256. It has a 256-bit block size and a variable length key of up to 512 bits. Up to now, all attacks on more than 37 rounds require at least 2235 bytes of memory.
Ewan Fleischmann   +2 more
openaire   +1 more source

Improved Boomerang Attacks on Deoxys-BC

2023
Jiahao Zhao   +4 more
openaire   +1 more source

Parallel Validity Analysis of the Boomerang Attack Model

2022
Pei Li   +3 more
openaire   +1 more source

Boomerang Attacks on Reduced-Round Midori64

Gönen, Mehmet Emin   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy