Results 11 to 20 of about 10,650 (191)

The (related-key) impossible boomerang attack and its application to the AES block cipher [PDF]

open access: yesDesigns, Codes, and Cryptography, 2010
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005.
Jiqiang Lu
core   +3 more sources

Related-Key Boomerang Attack on Block Cipher SQUARE [PDF]

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
Square is an 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design building blocks of Rijndael. Key schedule of Square is simple and efficient but fully affine, so we apply a related-key attack on it.
Bonwook KOO, Yongjin YEOM, Junghwan SONG
openaire   +3 more sources

Quantum Truncated Differential and Boomerang Attack

open access: yesSymmetry
In order to design quantum-safe block ciphers, it is crucial to investigate the application of quantum algorithms to cryptographic analysis tools. In this study, we use the Bernstein–Vazirani algorithm to enhance truncated differential cryptanalysis and boomerang cryptanalysis.
Huiqin Xie, Li Yang
openaire   +4 more sources

The Retracing Boomerang Attack, with Application to Reduced-Round AES

open access: yesJournal of Cryptology
AbstractBoomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability $$p^2q^2$$
Dunkelman, Orr   +3 more
openaire   +4 more sources

CryptoMaze: Atomic Off-Chain Payments in Payment Channel Network [PDF]

open access: yes, 2020
Payment protocols developed to realize off-chain transactions in Payment channel network (PCN) assumes the underlying routing algorithm transfers the payment via a single path. However, a path may not have sufficient capacity to route a transaction.
Mazumdar, Subhra, Ruj, Sushmita
core   +2 more sources

CMB Analysis [PDF]

open access: yes, 2001
We describe the subject of Cosmic Microwave Background (CMB) analysis - its past, present and future. The theory of Gaussian primary anisotropies, those arising from linear physics operating in the early Universe, is in reasonably good shape so the focus
Bond, J. Richard, Crittenden, Robert G.
core   +2 more sources

New Properties of the Double Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Qianqian Yang   +4 more
doaj   +1 more source

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that ...
Haoyang Wang, Thomas Peyrin
doaj   +1 more source

Breaking HALFLOOP-24

open access: yesIACR Transactions on Symmetric Cryptology, 2022
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications.
Marcus Dansarie   +3 more
doaj   +1 more source

Boomerang Attacks on BLAKE-32 [PDF]

open access: yes, 2011
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang attacks on up to 8 round-reduced keyed permutation of BLAKE-32. Also, we show that boomerangs can be used as distinguishers for hash/ compression functions and present such distinguishers for the compression function of BLAKE ...
Biryukov, Alex   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy