Results 181 to 190 of about 10,636 (192)
Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher
Yu Sasaki
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128
Kitae Jeong +4 more
openalex +1 more source
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Qianqian Yang +7 more
openalex +1 more source
The Boomerang Attack on ChaCha Stream Cipher Permutation
2024 6th International Conference on Computer Communication and the Internet (ICCCI)Nasratullah Ghafoori, Atsuko Miyaji
openaire +1 more source
Boomerang Packet Testing to Mitigate Wormhole Attack in MANET
2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)K. Rajkumar +3 more
openaire +1 more source
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.
Jiazhe Chen, Keting Jia
openalex
New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC
Chinese Journal of ElectronicsJiamei Liu, Lin Tan, Hong Xu
openaire +1 more source

