Results 11 to 20 of about 7,070 (136)

The (related-key) impossible boomerang attack and its application to the AES block cipher [PDF]

open access: yesDesigns, Codes and Cryptography, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jiqiang Lu
core   +7 more sources

Impossible Boomerang Attack for Block Cipher Structures [PDF]

open access: yesLecture Notes in Computer Science, 2009
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search.
Jiali Choy, Huihui Yap
core   +6 more sources

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: yesIACR Communications in Cryptology
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this paper, we propose a holistic framework comprising two generic and effective algorithms and a MILP ...
Yincen Chen   +5 more
openaire   +3 more sources

Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]

open access: yes, 2018
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core   +2 more sources

Rectangle Attack Against Type‐I Generalized Feistel Structures

open access: yesChinese Journal of Electronics, Volume 31, Issue 4, Page 713-720, July 2022., 2022
Type‐I generalized Feistel networks (GFN) are widely used frameworks in symmetric‐key primitive designs such as CAST‐256 and Lesamnta. Different from the extensive studies focusing on specific block cipher instances, the analysis against Type‐I GFN structures gives generic security evaluation of the basic frameworks and concentrates more on the effect ...
Yi ZHANG   +3 more
wiley   +1 more source

CMB Analysis [PDF]

open access: yes, 2001
We describe the subject of Cosmic Microwave Background (CMB) analysis - its past, present and future. The theory of Gaussian primary anisotropies, those arising from linear physics operating in the early Universe, is in reasonably good shape so the focus
Bond, J. Richard, Crittenden, Robert G.
core   +2 more sources

Hannah Arendt's Ghosts:Reflections on the Disputable Path from Windhoek to Auschwitz [PDF]

open access: yes, 2009
Historians on both sides of the Atlantic are currently engaged in a controversy about the allegedly genocidal nature of western colonialism and its connections with the mass violence unleashed by Nazi Germany between 1939 and 1945.
Angrick   +112 more
core   +1 more source

Education & countering violent extremism: western logics from South to North [PDF]

open access: yes, 2017
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core   +1 more source

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Polytopic Cryptanalysis [PDF]

open access: yes, 2016
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov   +25 more
core   +3 more sources

Home - About - Disclaimer - Privacy