Results 21 to 30 of about 153 (84)
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery [PDF]
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi +6 more
core
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function [PDF]
Many modes of operations for block ciphers or tweakable block ciphers do not require invertibility from their underlying primitive. In this work, we study fixed-length Tweakable Pseudorandom Function (TPRF) with large domain extension, a novel primitive ...
Antoon Purnal +5 more
core
Automatic Generation of Declarative Models For Differential Cryptanalysis [PDF]
When designing a new symmetric block cipher, it is necessary to evaluate its robustness against differential attacks. This is done by computing Truncated Differential Characteristics (TDCs) that provide bounds on the complexity of these attacks. TDCs are
+3 more
core +3 more sources
New Properties of Double Boomerang Connectivity Table [PDF]
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Danping Shi +4 more
core
Criptografia Autenticada -Uma breve análise dos concorrentes do CAESAR [PDF]
This survey seeks to briefly introduce the branch of authenticated cryptography as well as the concepts of "lightweight cryptography"; Or lightweight cryptography, presenting a brief description of the CAESAR participating algorithms, as well as ...
dos Santos, Luan Cardoso
core +2 more sources
In this study, we identified an NSUN6‐dependent m5C‐modified tsRNA, m5C‐tRF3b CysGCA‐23 (mtRC), that is downregulated in BC and inversely correlated with disease progression. Mechanistically, mtRC suppresses BC malignancy by stabilizing RBM4, attenuating glycolysis, and thereby limiting H3K18 lactylation–mediated activation of IL1RAP and VASH2 ...
Xiaoling Ying +16 more
wiley +1 more source
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners [PDF]
In this paper, we study DFA attacks on some of the CAESAR competition winners. We study the challenges imposed by the design of these modes, such as masking of the ciphertext.
Anupam Chattopadhyay +2 more
core +1 more source
Background Methotrexate (MTX) is the first‐line therapy for juvenile idiopathic arthritis (JIA), but up to 40% of patients don't respond. Low inosine‐triphosphate‐pyrophosphatase (ITPA) activity has been associated with reduced clinical remission. We investigated ITPA role and the underlying mechanisms in vitro.
Sofia Sindici Forgiarini +19 more
wiley +1 more source
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin +3 more
core
Nanomaterials‐mediated glycolysis rewriting to potentiate tumor immunotherapy
This review systematically summarizes cutting‐edge advances in glycolysis‐rewiring nanomedicines, emphasizing their mechanisms in reversing immunosuppression and reinvigorating antitumor immune responses. Challenges in clinical translation and future directions for designing multifunctional metabolic‐immune modulators are also critically discussed ...
Zilin Ma +9 more
wiley +1 more source

