Results 31 to 40 of about 10,650 (191)

Data Analysis for the Microwave Anisotropy Probe (MAP) Mission [PDF]

open access: yes, 2000
We present an overview of the upcoming Microwave Anisotropy Probe (MAP) mission, with an emphasis on those aspects of the mission that simplify the data analysis.
Hinshaw, Gary
core   +3 more sources

Operation Pillar of Defence and the 2013 Israeli elections: defensive or provocative intervention? [PDF]

open access: yes, 2014
Based on the research on the psychological and political effects of terrorism, this paper focuses on the possible use of provocative counter-terrorism operations in order to influence the outcome of elections.
Orenes, Philippse
core   +4 more sources

Related-key impossible boomerang cryptanalysis on LBlock

open access: yesTongxin xuebao, 2017
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj   +2 more sources

A tutorial of boomerang attack on SMALLPRESENT-[4]

open access: yesJournal of Physics: Conference Series, 2021
Abstract In 2010, Leander proposed a new version of the block cipher PRESENT with smaller block size, namely SMALLPRESENT-[n]. This algorithm is designed to deepen understanding of how the running time of the algorithm and the vulnerability of attack during the round increase with the number of rounds and s-boxes not determined on the ...
I W Hutahaean, A A Lestari, B H Susanti
openaire   +1 more source

Post-Apocalyptic Geographies and Structural Appropriation [PDF]

open access: yes, 2018
Excerpt from Routledge Companion to Transnational American Studies, edited by Nina Morgan, Alfred Hornung, and Takayuki ...
Hsu, Hsuan L., Yazell, Bryan
core   +1 more source

The Boomerang Attack [PDF]

open access: yes, 1999
This paper describes a new differential-style attack, which we call the boomerang attack. This attack has several interesting applications. First, we disprove the of t-repeated claim that eliminating all high-probability differentials for the whole cipher is sufficient to guarantee security against differential attacks.
openaire   +1 more source

Artivistic interventions as humorous re-appropriations

open access: yesThe European Journal of Humour Research, 2015
The article reflects on the synergic interaction of artistic creativity and activist engagement through a humorous approach of some contemporary civilian protest actions in Slovenia.
Aldo Milohnic
doaj   +3 more sources

Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj   +1 more source

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

Algebraic Techniques in Differential Cryptanalysis [PDF]

open access: yes, 2008
. In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic relations arising from differential characteristics to speed up and ...
Albrecht, Martin, Cid, Carlos
core   +5 more sources

Home - About - Disclaimer - Privacy