Results 11 to 20 of about 10,588 (175)

Operation Pillar of Defence and the 2013 Israeli elections: defensive or provocative intervention? [PDF]

open access: yes, 2014
Based on the research on the psychological and political effects of terrorism, this paper focuses on the possible use of provocative counter-terrorism operations in order to influence the outcome of elections.
Orenes, Philippse
core   +4 more sources

The (related-key) impossible boomerang attack and its application to the AES block cipher [PDF]

open access: yes, 2010
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005.
Jiqiang Lu
core   +1 more source

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that ...
Haoyang Wang, Thomas Peyrin
doaj   +1 more source

New Properties of the Double Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Qianqian Yang   +4 more
doaj   +1 more source

Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]

open access: yes, 2018
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core   +2 more sources

Breaking HALFLOOP-24

open access: yesIACR Transactions on Symmetric Cryptology, 2022
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications.
Marcus Dansarie   +3 more
doaj   +1 more source

Boomerang Attacks on BLAKE-32 [PDF]

open access: yes, 2011
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang attacks on up to 8 round-reduced keyed permutation of BLAKE-32. Also, we show that boomerangs can be used as distinguishers for hash/ compression functions and present such distinguishers for the compression function of BLAKE ...
Biryukov, Alex   +2 more
openaire   +2 more sources

CMB Analysis [PDF]

open access: yes, 2001
We describe the subject of Cosmic Microwave Background (CMB) analysis - its past, present and future. The theory of Gaussian primary anisotropies, those arising from linear physics operating in the early Universe, is in reasonably good shape so the focus
Bond, J. Richard, Crittenden, Robert G.
core   +2 more sources

The QARMAv2 Family of Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area.
Roberto Avanzi   +6 more
doaj   +1 more source

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

Home - About - Disclaimer - Privacy