Results 171 to 180 of about 10,636 (192)

Improved Boomerang Attacks on SM3

2013
The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features.
Bai, Dongxia   +3 more
openaire   +1 more source

A related-key boomerang distinguishing attack of Threefish-256

Wuhan University Journal of Natural Sciences, 2012
The block cipher Threefish is the main component of Skein, which is based on ARX. Based on the efficient algorithms for calculating the differential of modular addition, we extend local collisions of Threefish-256 to more round by using related-key differential of addition in this paper.
Shusheng Liu, Libin Wang, Zheng Gong
openaire   +1 more source

Related-key boomerang attacks on two larger variants of HALFLOOP

open access: closedFrontiers of Computer Science
Kangkang Shi   +2 more
openalex   +2 more sources

Related-Key Boomerang Attacks on KATAN32/48/64

2013
KATAN/KTANTAN is a family of hardware oriented block ciphers proposed at CHES 2009. Although the KTANTAN family have been broken by a meet-in-the-middle approach, the KATAN family are secure at present. In this paper, we investigate the KATAN family in the related-key boomerang framework with several techniques.
Takanori Isobe, Yu Sasaki, Jiageng Chen
openaire   +1 more source

Revisiting the Boomerang Attack From a Perspective of 3-Differential

IEEE Transactions on Information Theory
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Libo Wang   +4 more
openaire   +1 more source

Improved Related-Tweakey Boomerang Attacks on Deoxys-BC

2018
This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
openaire   +1 more source

Improved Boomerang Attacks on Deoxys-BC

2023
Jiahao Zhao   +4 more
openaire   +1 more source

POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack

open access: closed, 2021
Laetitia Debesse   +2 more
openalex   +1 more source

Parallel Validity Analysis of the Boomerang Attack Model

2022
Pei Li   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy