Results 41 to 50 of about 10,387 (191)

On the Feistel Counterpart of the Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2020
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following works led
Hamid Boukerrou   +4 more
doaj   +1 more source

The Boomerang Attacks on the Round-Reduced Skein-512 [PDF]

open access: yes, 2013
The hash function Skein is one of the five finalists of the NIST SHA-3 competition. It is based on the block cipher Threefish which only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX). This paper studies the boomerang attacks on Skein-512.
Jiazhe Chen   +4 more
openaire   +3 more sources

On the Boomerang Uniformity of Cryptographic Sboxes

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher.
Christina Boura, Anne Canteaut
doaj   +1 more source

Post-Apocalyptic Geographies and Structural Appropriation [PDF]

open access: yes, 2018
Excerpt from Routledge Companion to Transnational American Studies, edited by Nina Morgan, Alfred Hornung, and Takayuki ...
Hsu, Hsuan L., Yazell, Bryan
core   +1 more source

Education & countering violent extremism: western logics from South to North [PDF]

open access: yes, 2017
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core   +1 more source

Related-key impossible boomerang cryptanalysis on LBlock

open access: yesTongxin xuebao, 2017
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj   +2 more sources

Polytopic Cryptanalysis [PDF]

open access: yes, 2016
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov   +25 more
core   +3 more sources

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

Artivistic interventions as humorous re-appropriations

open access: yesThe European Journal of Humour Research, 2015
The article reflects on the synergic interaction of artistic creativity and activist engagement through a humorous approach of some contemporary civilian protest actions in Slovenia.
Aldo Milohnic
doaj   +3 more sources

Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj   +1 more source

Home - About - Disclaimer - Privacy