Results 181 to 190 of about 10,387 (191)
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Hongbo Yu, Yonglin Hao, Dongxia Bai
openalex +1 more source
Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
Suriyani Ariffin +3 more
openalex +1 more source
New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC
Jiamei Liu, Lin Tan, Hong Xu
openalex +1 more source
Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC
Kangkang Shi +2 more
openalex +1 more source
New Results on Boomerang and Rectangle Attack.
Eli Biham, Orr Dunkelman, Nathan Keller
openalex
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.
Jiazhe Chen, Keting Jia
openalex

