Results 11 to 20 of about 7,070 (136)
The (related-key) impossible boomerang attack and its application to the AES block cipher [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jiqiang Lu
core +7 more sources
Impossible Boomerang Attack for Block Cipher Structures [PDF]
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search.
Jiali Choy, Huihui Yap
core +6 more sources
A Holistic Framework for Impossible Boomerang Attacks [PDF]
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this paper, we propose a holistic framework comprising two generic and effective algorithms and a MILP ...
Yincen Chen +5 more
openaire +3 more sources
Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core +2 more sources
Rectangle Attack Against Type‐I Generalized Feistel Structures
Type‐I generalized Feistel networks (GFN) are widely used frameworks in symmetric‐key primitive designs such as CAST‐256 and Lesamnta. Different from the extensive studies focusing on specific block cipher instances, the analysis against Type‐I GFN structures gives generic security evaluation of the basic frameworks and concentrates more on the effect ...
Yi ZHANG +3 more
wiley +1 more source
We describe the subject of Cosmic Microwave Background (CMB) analysis - its past, present and future. The theory of Gaussian primary anisotropies, those arising from linear physics operating in the early Universe, is in reasonably good shape so the focus
Bond, J. Richard, Crittenden, Robert G.
core +2 more sources
Hannah Arendt's Ghosts:Reflections on the Disputable Path from Windhoek to Auschwitz [PDF]
Historians on both sides of the Atlantic are currently engaged in a controversy about the allegedly genocidal nature of western colonialism and its connections with the mass violence unleashed by Nazi Germany between 1939 and 1945.
Angrick +112 more
core +1 more source
Education & countering violent extremism: western logics from South to North [PDF]
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core +1 more source
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov +25 more
core +3 more sources

