Results 181 to 190 of about 10,650 (191)
Some of the next articles are maybe not open access.
CANCER: 'NOT YET READY FOR A NARROWLY TARGETED ATTACK'
Ca-A Cancer Journal for Clinicians, 1978exaly
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Science China Information Sciences, 2016exaly
The Boomerang Attack on ChaCha Stream Cipher Permutation
2024 6th International Conference on Computer Communication and the Internet (ICCCI)Nasratullah Ghafoori, Atsuko Miyaji
openaire +1 more source
Boomerang Packet Testing to Mitigate Wormhole Attack in MANET
2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)K. Rajkumar +3 more
openaire +1 more source
New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC
Chinese Journal of ElectronicsJiamei Liu, Lin Tan, Hong Xu
openaire +1 more source
Related-key boomerang attacks on two larger variants of HALFLOOP
Frontiers of Computer ScienceKangkang Shi +2 more
openaire +1 more source

