Results 121 to 130 of about 16,934 (147)
Some of the next articles are maybe not open access.
An Asymmetric Impossible Boomerang Attack on 7-Round AES-128
Chinese Journal of Computers, 2011Xiao-Li DONG +3 more
semanticscholar +3 more sources
Revisiting the Boomerang Attack From a Perspective of 3-Differential
IEEE Transactions on Information TheoryIn this paper, inspired by the work of Beyne and Rijmen at CRYPTO 2022, we explore the accurate probability of $d$ -differential in the fixed-key model.
Libo Wang +4 more
semanticscholar +1 more source
The Boomerang Attack on ChaCha Stream Cipher Permutation
International Conference on Computational Collective IntelligenceThe ChaCha stream cipher, deployed in TLS 1.3, plays a significant role in internet security. ChaCha's security has been well-studied against differential and differential-linear attacks.
Nasratullah Ghafoori, Atsuko Miyaji
semanticscholar +1 more source

