Results 31 to 40 of about 10,588 (175)
A tutorial of boomerang attack on SMALLPRESENT-[4]
Abstract In 2010, Leander proposed a new version of the block cipher PRESENT with smaller block size, namely SMALLPRESENT-[n]. This algorithm is designed to deepen understanding of how the running time of the algorithm and the vulnerability of attack during the round increase with the number of rounds and s-boxes not determined on the ...
I W Hutahaean, A A Lestari, B H Susanti
openaire +1 more source
This paper describes a new differential-style attack, which we call the boomerang attack. This attack has several interesting applications. First, we disprove the of t-repeated claim that eliminating all high-probability differentials for the whole cipher is sufficient to guarantee security against differential attacks.
openaire +1 more source
Artivistic interventions as humorous re-appropriations
The article reflects on the synergic interaction of artistic creativity and activist engagement through a humorous approach of some contemporary civilian protest actions in Slovenia.
Aldo Milohnic
doaj +3 more sources
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj +1 more source
Related-Key Boomerang Attack on Block Cipher SQUARE [PDF]
Square is an 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design building blocks of Rijndael. Key schedule of Square is simple and efficient but fully affine, so we apply a related-key attack on it.
Bonwook KOO, Yongjin YEOM, Junghwan SONG
openaire +1 more source
Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj +1 more source
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov +25 more
core +3 more sources
NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS
A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key ...
Hassan Mansur Hussien +2 more
doaj +1 more source
Boomerang Attack on Step-Reduced SHA-512 [PDF]
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack.
Hongbo Yu, Dongxia Bai
openaire +1 more source
ABSTRACT Deforestation and its social impacts are an enduring challenge in agrarian frontiers, especially in the tropics. Fueled by global demand for commodities, this process is mediated by ideas, concepts, meanings, and policies that uphold socioenvironmental degradation. A key and understudied—arena in which this mediation occurs is the sub‐national
Gabriela Russo Lopes, Fabio de Castro
wiley +1 more source

