Results 121 to 130 of about 7,070 (136)
Some of the next articles are maybe not open access.
On the boomerang uniformity of some permutation polynomials
Cryptography and Communications, 2020Marco Calderini, Irene Villa
exaly
On the boomerang uniformity of quadratic permutations
Designs, Codes, and Cryptography, 2020Sihem Mesnager +2 more
exaly
New results on quantum boomerang attacks
Quantum Information Processing, 2023Jian Zou, Yiyuan Luo
exaly
Boomerang uniformity of normalized permutation polynomials of low degree
Applicable Algebra in Engineering, Communications and Computing, 2020Qiang Wang, Weiguo Zhang
exaly
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory, 2012Bart Preneel +2 more
exaly
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
Lecture Notes in Computer Science, 2021exaly
Related-Key Boomerang Attack on Block Cipher SQUARE
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011Yongjin Yeom
exaly
CANCER: 'NOT YET READY FOR A NARROWLY TARGETED ATTACK'
Ca-A Cancer Journal for Clinicians, 1978exaly
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Science China Information Sciences, 2016exaly

