Results 131 to 140 of about 16,934 (147)
Some of the next articles are maybe not open access.

Non-local elastic lattices with PT-symmetry and time modulation: From perfect trapping to the wave boomerang effect

Extreme Mechanics Letters
Wave motion is fundamentally constrained by the dispersion properties of the medium, often making it challenging -- or even impossible -- to guide wave packets along desired trajectories, particularly when wave inversion is required.
E. Riva
semanticscholar   +1 more source

ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials

IACR Cryptology ePrint Archive
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and ...
A. Kundu   +3 more
semanticscholar   +1 more source

Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256

IACR Cryptology ePrint Archive, 2022
Jian Guo, Ling Song, Haoyang Wang
semanticscholar   +1 more source

A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis

Journal of Supercomputing, 2022
D. Pal   +3 more
semanticscholar   +1 more source

Related-tweakey impossible differential attack on QARMA-128

Science China Information Sciences, 2021
Juan Du   +3 more
semanticscholar   +1 more source

The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher

International Conference on Advanced Information Networking and Applications, 2017
Yusuke Takahashi, Y. Igarashi, T. Kaneko
semanticscholar   +1 more source

9-round attack on AES-256 by a 6-round property

Iranian Conference on Electrical Engineering, 2010
Alireza Sharifi   +2 more
semanticscholar   +1 more source

Cryptanalysis of Raindrop and FBC

International Conference on Network and System Security, 2019
Bingqing Ren   +5 more
semanticscholar   +1 more source

The Retracing Boomerang Attack

IACR Cryptology ePrint Archive, 2020
O. Dunkelman   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy