Results 41 to 50 of about 10,387 (191)
On the Feistel Counterpart of the Boomerang Connectivity Table
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following works led
Hamid Boukerrou +4 more
doaj +1 more source
The Boomerang Attacks on the Round-Reduced Skein-512 [PDF]
The hash function Skein is one of the five finalists of the NIST SHA-3 competition. It is based on the block cipher Threefish which only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX). This paper studies the boomerang attacks on Skein-512.
Jiazhe Chen +4 more
openaire +3 more sources
On the Boomerang Uniformity of Cryptographic Sboxes
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher.
Christina Boura, Anne Canteaut
doaj +1 more source
Post-Apocalyptic Geographies and Structural Appropriation [PDF]
Excerpt from Routledge Companion to Transnational American Studies, edited by Nina Morgan, Alfred Hornung, and Takayuki ...
Hsu, Hsuan L., Yazell, Bryan
core +1 more source
Education & countering violent extremism: western logics from South to North [PDF]
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core +1 more source
Related-key impossible boomerang cryptanalysis on LBlock
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj +2 more sources
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov +25 more
core +3 more sources
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj +1 more source
Artivistic interventions as humorous re-appropriations
The article reflects on the synergic interaction of artistic creativity and activist engagement through a humorous approach of some contemporary civilian protest actions in Slovenia.
Aldo Milohnic
doaj +3 more sources
Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj +1 more source

