Results 1 to 10 of about 454,487 (179)
Differential Meet-In-The-Middle Cryptanalysis
In this paper we introduce the differential meet-in-the-middle framework, a new cryptanalysis technique for symmetric primitives. Our new cryptanalysis method combines techniques from both meet-in-themiddle and differential cryptanalysis. As such, the introduced technique can be seen as a way of extending meet-in-the-middle attacks and their variants ...
Boura, Christina +4 more
exaly +3 more sources
Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +3 more sources
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and ...
Qingyuan Yu +6 more
doaj +1 more source
AbstractOver the last two decades Australia and New Zealand have become similar again, mirroring the closeness they shared when they first instituted social protection regimes a century ago. Their current closeness, however, is based on very different regimes to those they began with 130 years ago.
openaire +2 more sources
Introduction: Meeting in the Middle [PDF]
AbstractCompromise is routinely evoked in everyday language and in scholarly debates across the social sciences. Yet, it has been subjected to relatively little systematic study. The introduction to this inter-disciplinary volume addresses the research gap in three steps.
Bellamy, R, Kornprobst, M, Reh, C
openaire +3 more sources
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj +1 more source
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +1 more source
Time-Memory Analysis of Parallel Collision Search Algorithms
Parallel versions of collision search algorithms require a significant amount of memory to store a proportion of the points computed by the pseudo-random walks.
Monika Trimoska +2 more
doaj +1 more source
As institutions of higher education began their full returns to campus in Fall 2021, questions arose about continuing the flexible student support services that emerged during the pandemic, the expectations students might have of the post-shutdown world, and whether there would be equity between the support of on-campus students and those who remained ...
Bettyjo Bouchey +2 more
openaire +1 more source
Support for copycat versions of biotechnology drugs is growing quickly in the US Congress. Meredith Wadman reports.
openaire +2 more sources

