Results 31 to 40 of about 10,636 (192)

Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]

open access: yes, 2018
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core   +2 more sources

New Properties of the Double Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Qianqian Yang   +4 more
doaj   +1 more source

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

The QARMAv2 Family of Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area.
Roberto Avanzi   +6 more
doaj   +1 more source

CMB Analysis [PDF]

open access: yes, 2001
We describe the subject of Cosmic Microwave Background (CMB) analysis - its past, present and future. The theory of Gaussian primary anisotropies, those arising from linear physics operating in the early Universe, is in reasonably good shape so the focus
Bond, J. Richard, Crittenden, Robert G.
core   +2 more sources

Boomerang Attacks on BLAKE-32 [PDF]

open access: yes, 2011
We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang attacks on up to 8 round-reduced keyed permutation of BLAKE-32. Also, we show that boomerangs can be used as distinguishers for hash/ compression functions and present such distinguishers for the compression function of BLAKE ...
Biryukov, Alex   +2 more
openaire   +2 more sources

Breaking HALFLOOP-24

open access: yesIACR Transactions on Symmetric Cryptology, 2022
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications.
Marcus Dansarie   +3 more
doaj   +1 more source

On the Feistel Counterpart of the Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2020
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following works led
Hamid Boukerrou   +4 more
doaj   +1 more source

Hannah Arendt's Ghosts:Reflections on the Disputable Path from Windhoek to Auschwitz [PDF]

open access: yes, 2009
Historians on both sides of the Atlantic are currently engaged in a controversy about the allegedly genocidal nature of western colonialism and its connections with the mass violence unleashed by Nazi Germany between 1939 and 1945.
Angrick   +112 more
core   +1 more source

On the Boomerang Uniformity of Cryptographic Sboxes

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher.
Christina Boura, Anne Canteaut
doaj   +1 more source

Home - About - Disclaimer - Privacy