Results 181 to 190 of about 10,636 (192)

Boomerang Attacks on Reduced-Round Midori64

Gönen, Mehmet Emin   +2 more
openaire   +1 more source

Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128

open access: closed, 2007
Kitae Jeong   +4 more
openalex   +1 more source

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

open access: closed
Qianqian Yang   +7 more
openalex   +1 more source

The Boomerang Attack on ChaCha Stream Cipher Permutation

2024 6th International Conference on Computer Communication and the Internet (ICCCI)
Nasratullah Ghafoori, Atsuko Miyaji
openaire   +1 more source

Boomerang Packet Testing to Mitigate Wormhole Attack in MANET

2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)
K. Rajkumar   +3 more
openaire   +1 more source

New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC

Chinese Journal of Electronics
Jiamei Liu, Lin Tan, Hong Xu
openaire   +1 more source

A Differential Boomerang Attack Against 10-round Kahkeshan

open access: closed, 2005
عباس قائمی بافقی   +1 more
openalex  

Home - About - Disclaimer - Privacy