Results 131 to 140 of about 16,934 (147)
Some of the next articles are maybe not open access.
Extreme Mechanics Letters
Wave motion is fundamentally constrained by the dispersion properties of the medium, often making it challenging -- or even impossible -- to guide wave packets along desired trajectories, particularly when wave inversion is required.
E. Riva
semanticscholar +1 more source
Wave motion is fundamentally constrained by the dispersion properties of the medium, often making it challenging -- or even impossible -- to guide wave packets along desired trajectories, particularly when wave inversion is required.
E. Riva
semanticscholar +1 more source
IACR Cryptology ePrint Archive
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and ...
A. Kundu +3 more
semanticscholar +1 more source
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and ...
A. Kundu +3 more
semanticscholar +1 more source
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256
IACR Cryptology ePrint Archive, 2022Jian Guo, Ling Song, Haoyang Wang
semanticscholar +1 more source
Related-tweakey impossible differential attack on QARMA-128
Science China Information Sciences, 2021Juan Du +3 more
semanticscholar +1 more source
The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher
International Conference on Advanced Information Networking and Applications, 2017Yusuke Takahashi, Y. Igarashi, T. Kaneko
semanticscholar +1 more source
9-round attack on AES-256 by a 6-round property
Iranian Conference on Electrical Engineering, 2010Alireza Sharifi +2 more
semanticscholar +1 more source
Cryptanalysis of Raindrop and FBC
International Conference on Network and System Security, 2019Bingqing Ren +5 more
semanticscholar +1 more source
The Retracing Boomerang Attack
IACR Cryptology ePrint Archive, 2020O. Dunkelman +3 more
semanticscholar +1 more source

