Results 141 to 147 of about 16,934 (147)
Some of the next articles are maybe not open access.

Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack

Science China Information Sciences, 2016
Hongbo Yu, Yonglin Hao, D. Bai
semanticscholar   +1 more source

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256

Science China Information Sciences, 2019
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
semanticscholar   +1 more source

Related-Key Impossible-Differential Attack on Reduced-Round Skinny

International Conference on Applied Cryptography and Network Security, 2017
Ralph Ankele   +6 more
semanticscholar   +1 more source

The Retracing Boomerang Attack, with Application to Reduced-Round AES

Journal of Cryptology
O. Dunkelman   +3 more
semanticscholar   +1 more source

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC

IACR Cryptology ePrint Archive, 2017
Christoph Dobraunig, Eik List
semanticscholar   +1 more source

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

Journal of Cryptology
Qianqian Yang   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy