Results 21 to 30 of about 10,650 (191)

The QARMAv2 Family of Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area.
Roberto Avanzi   +6 more
doaj   +1 more source

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]

open access: yes, 2018
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core   +2 more sources

On the Feistel Counterpart of the Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2020
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following works led
Hamid Boukerrou   +4 more
doaj   +1 more source

Quantum Boomerang Attacks and Some Applications

open access: yes, 2022
In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an exhaustive search of the key, much less is known on how to use specific vulnerabilities of the cipher to accelerate this procedure.
Frixons, Paul   +2 more
openaire   +2 more sources

On the Boomerang Uniformity of Cryptographic Sboxes

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher.
Christina Boura, Anne Canteaut
doaj   +1 more source

Related-Key Boomerang and Rectangle Attacks [PDF]

open access: yes, 2005
The boomerang attack and the rectangle attack are two attacks that utilize differential cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub-ciphers, where there exists a good differential for each sub-cipher, but not for the entire cipher.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Hannah Arendt's Ghosts:Reflections on the Disputable Path from Windhoek to Auschwitz [PDF]

open access: yes, 2009
Historians on both sides of the Atlantic are currently engaged in a controversy about the allegedly genocidal nature of western colonialism and its connections with the mass violence unleashed by Nazi Germany between 1939 and 1945.
Angrick   +112 more
core   +1 more source

Cultural Revolution: Mykhail Semenko, Ukrainian Futurism and the “National” Category [PDF]

open access: yes, 2017
This paper examines Mykhail Semenko’s Futurist manifestos that developed an opposition between “national” and “international” art, and specifically called “national” art provincial and retrograde.
Ilnytzkyj, Oleh S.
core   +1 more source

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +1 more source

Home - About - Disclaimer - Privacy