Results 31 to 40 of about 10,387 (191)

Operation Pillar of Defence and the 2013 Israeli elections: defensive or provocative intervention? [PDF]

open access: yes, 2014
Based on the research on the psychological and political effects of terrorism, this paper focuses on the possible use of provocative counter-terrorism operations in order to influence the outcome of elections.
Orenes, Philippse
core   +4 more sources

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +1 more source

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: hybrid
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Yincen Chen   +5 more
openalex   +3 more sources

New Properties of the Double Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Qianqian Yang   +4 more
doaj   +1 more source

CMB Analysis [PDF]

open access: yes, 2001
We describe the subject of Cosmic Microwave Background (CMB) analysis - its past, present and future. The theory of Gaussian primary anisotropies, those arising from linear physics operating in the early Universe, is in reasonably good shape so the focus
Bond, J. Richard, Crittenden, Robert G.
core   +2 more sources

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that ...
Haoyang Wang, Thomas Peyrin
doaj   +1 more source

Breaking HALFLOOP-24

open access: yesIACR Transactions on Symmetric Cryptology, 2022
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications.
Marcus Dansarie   +3 more
doaj   +1 more source

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

The QARMAv2 Family of Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area.
Roberto Avanzi   +6 more
doaj   +1 more source

Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]

open access: yes, 2018
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core   +2 more sources

Home - About - Disclaimer - Privacy