Results 21 to 30 of about 10,588 (175)
On the Feistel Counterpart of the Boomerang Connectivity Table
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following works led
Hamid Boukerrou +4 more
doaj +1 more source
Quantum Boomerang Attacks and Some Applications
In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an exhaustive search of the key, much less is known on how to use specific vulnerabilities of the cipher to accelerate this procedure.
Frixons, Paul +2 more
openaire +2 more sources
Hannah Arendt's Ghosts:Reflections on the Disputable Path from Windhoek to Auschwitz [PDF]
Historians on both sides of the Atlantic are currently engaged in a controversy about the allegedly genocidal nature of western colonialism and its connections with the mass violence unleashed by Nazi Germany between 1939 and 1945.
Angrick +112 more
core +1 more source
On the Boomerang Uniformity of Cryptographic Sboxes
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher.
Christina Boura, Anne Canteaut
doaj +1 more source
Related-Key Boomerang and Rectangle Attacks [PDF]
The boomerang attack and the rectangle attack are two attacks that utilize differential cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub-ciphers, where there exists a good differential for each sub-cipher, but not for the entire cipher.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire +1 more source
Post-Apocalyptic Geographies and Structural Appropriation [PDF]
Excerpt from Routledge Companion to Transnational American Studies, edited by Nina Morgan, Alfred Hornung, and Takayuki ...
Hsu, Hsuan L., Yazell, Bryan
core +1 more source
CryptoMaze: Atomic Off-Chain Payments in Payment Channel Network [PDF]
Payment protocols developed to realize off-chain transactions in Payment channel network (PCN) assumes the underlying routing algorithm transfers the payment via a single path. However, a path may not have sufficient capacity to route a transaction.
Mazumdar, Subhra, Ruj, Sushmita
core +2 more sources
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj +1 more source
Education & countering violent extremism: western logics from South to North [PDF]
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core +1 more source
Related-key impossible boomerang cryptanalysis on LBlock
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj +2 more sources

