Results 121 to 130 of about 16,934 (147)
Some of the next articles are maybe not open access.

An Asymmetric Impossible Boomerang Attack on 7-Round AES-128

Chinese Journal of Computers, 2011
Xiao-Li DONG   +3 more
semanticscholar   +3 more sources

Revisiting the Boomerang Attack From a Perspective of 3-Differential

IEEE Transactions on Information Theory
In this paper, inspired by the work of Beyne and Rijmen at CRYPTO 2022, we explore the accurate probability of $d$ -differential in the fixed-key model.
Libo Wang   +4 more
semanticscholar   +1 more source

The Boomerang Attack on ChaCha Stream Cipher Permutation

International Conference on Computational Collective Intelligence
The ChaCha stream cipher, deployed in TLS 1.3, plays a significant role in internet security. ChaCha's security has been well-studied against differential and differential-linear attacks.
Nasratullah Ghafoori, Atsuko Miyaji
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy