Results 31 to 40 of about 10,650 (191)
Data Analysis for the Microwave Anisotropy Probe (MAP) Mission [PDF]
We present an overview of the upcoming Microwave Anisotropy Probe (MAP) mission, with an emphasis on those aspects of the mission that simplify the data analysis.
Hinshaw, Gary
core +3 more sources
Operation Pillar of Defence and the 2013 Israeli elections: defensive or provocative intervention? [PDF]
Based on the research on the psychological and political effects of terrorism, this paper focuses on the possible use of provocative counter-terrorism operations in order to influence the outcome of elections.
Orenes, Philippse
core +4 more sources
Related-key impossible boomerang cryptanalysis on LBlock
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj +2 more sources
A tutorial of boomerang attack on SMALLPRESENT-[4]
Abstract In 2010, Leander proposed a new version of the block cipher PRESENT with smaller block size, namely SMALLPRESENT-[n]. This algorithm is designed to deepen understanding of how the running time of the algorithm and the vulnerability of attack during the round increase with the number of rounds and s-boxes not determined on the ...
I W Hutahaean, A A Lestari, B H Susanti
openaire +1 more source
Post-Apocalyptic Geographies and Structural Appropriation [PDF]
Excerpt from Routledge Companion to Transnational American Studies, edited by Nina Morgan, Alfred Hornung, and Takayuki ...
Hsu, Hsuan L., Yazell, Bryan
core +1 more source
This paper describes a new differential-style attack, which we call the boomerang attack. This attack has several interesting applications. First, we disprove the of t-repeated claim that eliminating all high-probability differentials for the whole cipher is sufficient to guarantee security against differential attacks.
openaire +1 more source
Artivistic interventions as humorous re-appropriations
The article reflects on the synergic interaction of artistic creativity and activist engagement through a humorous approach of some contemporary civilian protest actions in Slovenia.
Aldo Milohnic
doaj +3 more sources
Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj +1 more source
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj +1 more source
Algebraic Techniques in Differential Cryptanalysis [PDF]
. In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic relations arising from differential characteristics to speed up and ...
Albrecht, Martin, Cid, Carlos
core +5 more sources

