Results 141 to 147 of about 16,934 (147)
Some of the next articles are maybe not open access.
Symmetric SPN block cipher with Bit Slice involution S-box
, 2011Gyeong-Yeon Cho, Hong-Bok Song
semanticscholar +1 more source
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Science China Information Sciences, 2016Hongbo Yu, Yonglin Hao, D. Bai
semanticscholar +1 more source
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
Science China Information Sciences, 2019Rui Zong, Xiaoyang Dong, Xiaoyun Wang
semanticscholar +1 more source
Related-Key Impossible-Differential Attack on Reduced-Round Skinny
International Conference on Applied Cryptography and Network Security, 2017Ralph Ankele +6 more
semanticscholar +1 more source
The Retracing Boomerang Attack, with Application to Reduced-Round AES
Journal of CryptologyO. Dunkelman +3 more
semanticscholar +1 more source
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
IACR Cryptology ePrint Archive, 2017Christoph Dobraunig, Eik List
semanticscholar +1 more source
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Journal of CryptologyQianqian Yang +7 more
semanticscholar +1 more source

