Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function [PDF]
In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of attacks, breaking up to 9 rounds (out of the full 24) of the Keccak internal permutation much faster than exhaustive search. Moreover, some of our attacks
Dinur, Itai +4 more
openaire +2 more sources
Pyrite oxidation under initially neutral pH conditions and in the presence of Acidithiobacillus ferrooxidans and micromolar hydrogen peroxide [PDF]
Hydrogen peroxide (H2O2) at a micromolar level played a role in the microbial surface oxidation of pyrite crystals under initially neutral pH. When the mineral-bacteria system was cyclically exposed to 50 μM H2O2, the colonization of Acidithiobacillus ...
Lin, C., Ma, Y.
core +2 more sources
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack [PDF]
In this research, a recently proposed lightweight block cipher LBlock, not tested against the cube attack has been analyzed. 7, 8 and 9 round LBlock have been successfully attacked with complexities of O(210.76), O(211.11) and O(247.00) respectively. For the case of side channel cube attack, full version of LBlock has been attacked using a single bit ...
Islam, Saad +2 more
openaire +2 more sources
Durability of manufactured sand concrete in atmospheric acidification environment
In order to explore the possibility of replacing river sand with manufactured sand in concrete structures under atmospheric acidification environment, accelerated carbonation test and dry-wet circling test of sulfate attack was conducted in the ...
Yuanzhu Zhang, Luoyi Gu, Qianlu Zhang
doaj +1 more source
The effect of polypropylene fibres within concrete with regard to fire performance in structures [PDF]
Purpose – The purpose of this paper is to examine the effect of various polypropylene fibre additions (types and volume) to concrete with regard to explosive spalling when subject to high temperatures similar to those experienced in building or tunnel ...
Alan Richardson +2 more
core +1 more source
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 2015. It recovers the key through two phases: the preprocessing phase for precomputing a look-up table and online phase for querying the output and getting ...
Ling Song, Jian Guo
doaj +1 more source
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
Raghvendra Rohit +3 more
doaj +1 more source
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network.
Junghwan Song +2 more
doaj +1 more source
A Warp in Progress : H I and Radio Continuum Observations of the Spiral NGC 3145 [PDF]
Date of Acceptance: 16/06/2015We present VLA H I and 6 cm radio continuum observations of the spiral NGC 3145 and H I observations of its two companions, NGC 3143 and PGC 029578.
Banfi M. +23 more
core +3 more sources
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core +1 more source

