Results 81 to 90 of about 10,588 (175)
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core
The nearly Newtonian regime in Non-Linear Theories of Gravity
The present paper reconsiders the Newtonian limit of models of modified gravity including higher order terms in the scalar curvature in the gravitational action. This was studied using the Palatini variational principle in [Meng X. and Wang P.: Gen. Rel.
A.A. Starobinsky +18 more
core +2 more sources
The onset of the rain season in Thailand in the late April–early May is highly predictable from ending ENSO events. The predictability is highly non‐stationary from 1950 due to subtle changes during warm ENSO events, which last longer and are more intense from 1980 onward.
Vincent Moron +3 more
wiley +1 more source
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [PDF]
We introduce a new cryptanalytic technique based on Wagner's boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang attack, and then demonstrate its use on reduced-round variants of the MARS core and Serpent. Our attack breaks eleven rounds of the MARS core with 265 chosen plaintexts, 270 memory, and 2229
John Kelsey +2 more
openaire +1 more source
War as a continuation of politics by other means... unmanned [PDF]
The growth of US combat capability due to the operational introduction of drones is the most significant of any weapon system in recent decades. Under this new operating model, the drones are proliferating a myriad of essential activities in the battle ...
João Paulo Vicente
doaj
A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box
Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitution box (S-box), several efforts have been ...
Ismail El Gaabouri +3 more
doaj +1 more source
A Holistic Framework for Impossible Boomerang Attacks
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this paper, we propose a holistic framework comprising two generic and effective algorithms and a MILP ...
Yincen Chen +5 more
openaire +1 more source
The Boomerang Attack on 5 and 6-Round Reduced AES [PDF]
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.
openaire +2 more sources
The Boomerang Attacks on BLAKE and BLAKE2 [PDF]
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities \(2^{464}\) and \(2^{474}\) respectively.
openaire +1 more source
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj +1 more source

