Results 1 to 10 of about 454,487 (179)

Differential Meet-In-The-Middle Cryptanalysis

open access: yesLecture Notes in Computer Science, 2023
In this paper we introduce the differential meet-in-the-middle framework, a new cryptanalysis technique for symmetric primitives. Our new cryptanalysis method combines techniques from both meet-in-themiddle and differential cryptanalysis. As such, the introduced technique can be seen as a way of extending meet-in-the-middle attacks and their variants ...
Boura, Christina   +4 more
exaly   +3 more sources

Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +3 more sources

Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and ...
Qingyuan Yu   +6 more
doaj   +1 more source

Meeting in the Middle [PDF]

open access: yes, 2020
AbstractOver the last two decades Australia and New Zealand have become similar again, mirroring the closeness they shared when they first instituted social protection regimes a century ago. Their current closeness, however, is based on very different regimes to those they began with 130 years ago.
openaire   +2 more sources

Introduction: Meeting in the Middle [PDF]

open access: yesGovernment and Opposition, 2012
AbstractCompromise is routinely evoked in everyday language and in scholarly debates across the social sciences. Yet, it has been subjected to relatively little systematic study. The introduction to this inter-disciplinary volume addresses the research gap in three steps.
Bellamy, R, Kornprobst, M, Reh, C
openaire   +3 more sources

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm

open access: yesIEEE Access, 2020
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj   +1 more source

Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search

open access: yesIET Information Security, 2023
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +1 more source

Time-Memory Analysis of Parallel Collision Search Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Parallel versions of collision search algorithms require a significant amount of memory to store a proportion of the points computed by the pseudo-random walks.
Monika Trimoska   +2 more
doaj   +1 more source

Meeting in the Middle

open access: yes, 2022
As institutions of higher education began their full returns to campus in Fall 2021, questions arose about continuing the flexible student support services that emerged during the pandemic, the expectations students might have of the post-shutdown world, and whether there would be equity between the support of on-campus students and those who remained ...
Bettyjo Bouchey   +2 more
openaire   +1 more source

Meeting in the middle [PDF]

open access: yesNature, 2007
Support for copycat versions of biotechnology drugs is growing quickly in the US Congress. Meredith Wadman reports.
openaire   +2 more sources

Home - About - Disclaimer - Privacy