Results 171 to 180 of about 10,636 (192)
The Amplified Boomerang Attack on ChaCha
Nasratullah Ghafoori, Atsuko Miyaji
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Improved Boomerang Attacks on SM3
2013The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features.
Bai, Dongxia +3 more
openaire +1 more source
A related-key boomerang distinguishing attack of Threefish-256
Wuhan University Journal of Natural Sciences, 2012The block cipher Threefish is the main component of Skein, which is based on ARX. Based on the efficient algorithms for calculating the differential of modular addition, we extend local collisions of Threefish-256 to more round by using related-key differential of addition in this paper.
Shusheng Liu, Libin Wang, Zheng Gong
openaire +1 more source
Related-key boomerang attacks on two larger variants of HALFLOOP
Kangkang Shi +2 more
openalex +2 more sources
Related-Key Boomerang Attacks on KATAN32/48/64
2013KATAN/KTANTAN is a family of hardware oriented block ciphers proposed at CHES 2009. Although the KTANTAN family have been broken by a meet-in-the-middle approach, the KATAN family are secure at present. In this paper, we investigate the KATAN family in the related-key boomerang framework with several techniques.
Takanori Isobe, Yu Sasaki, Jiageng Chen
openaire +1 more source
Revisiting the Boomerang Attack From a Perspective of 3-Differential
IEEE Transactions on Information TheoryzbMATH Open Web Interface contents unavailable due to conflicting licenses.
Libo Wang +4 more
openaire +1 more source
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
2018This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
openaire +1 more source
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
Laetitia Debesse +2 more
openalex +1 more source

