Results 31 to 40 of about 10,588 (175)

A tutorial of boomerang attack on SMALLPRESENT-[4]

open access: yesJournal of Physics: Conference Series, 2021
Abstract In 2010, Leander proposed a new version of the block cipher PRESENT with smaller block size, namely SMALLPRESENT-[n]. This algorithm is designed to deepen understanding of how the running time of the algorithm and the vulnerability of attack during the round increase with the number of rounds and s-boxes not determined on the ...
I W Hutahaean, A A Lestari, B H Susanti
openaire   +1 more source

The Boomerang Attack [PDF]

open access: yes, 1999
This paper describes a new differential-style attack, which we call the boomerang attack. This attack has several interesting applications. First, we disprove the of t-repeated claim that eliminating all high-probability differentials for the whole cipher is sufficient to guarantee security against differential attacks.
openaire   +1 more source

Artivistic interventions as humorous re-appropriations

open access: yesThe European Journal of Humour Research, 2015
The article reflects on the synergic interaction of artistic creativity and activist engagement through a humorous approach of some contemporary civilian protest actions in Slovenia.
Aldo Milohnic
doaj   +3 more sources

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

Related-Key Boomerang Attack on Block Cipher SQUARE [PDF]

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
Square is an 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design building blocks of Rijndael. Key schedule of Square is simple and efficient but fully affine, so we apply a related-key attack on it.
Bonwook KOO, Yongjin YEOM, Junghwan SONG
openaire   +1 more source

Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj   +1 more source

Polytopic Cryptanalysis [PDF]

open access: yes, 2016
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov   +25 more
core   +3 more sources

NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS

open access: yesJournal of ICT, 2018
A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key ...
Hassan Mansur Hussien   +2 more
doaj   +1 more source

Boomerang Attack on Step-Reduced SHA-512 [PDF]

open access: yes, 2015
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack.
Hongbo Yu, Dongxia Bai
openaire   +1 more source

State‐Level Politics in Forest Governance: The Role of the Narrative‐Policy Nexus in the Brazilian Amazon

open access: yesEnvironmental Policy and Governance, EarlyView.
ABSTRACT Deforestation and its social impacts are an enduring challenge in agrarian frontiers, especially in the tropics. Fueled by global demand for commodities, this process is mediated by ideas, concepts, meanings, and policies that uphold socioenvironmental degradation. A key and understudied—arena in which this mediation occurs is the sub‐national
Gabriela Russo Lopes, Fabio de Castro
wiley   +1 more source

Home - About - Disclaimer - Privacy