Results 51 to 60 of about 454,487 (179)

Meet-in-the-middle attack on 11-round 3D cipher

open access: yesTongxin xuebao, 2015
A new 6-round meet-in-the-middle distinguisher was constructed by introducing multiset,making use of properties of the S-box was proposed and the truncated differential characteristic.Based on the distinguisher,a meet-in-the-middle attack on 11-round 3D ...
Jiong-jiong REN, Shao-zhen CHEN
doaj   +2 more sources

Cryptanalysis of AES-PRF and Its Dual

open access: yesIACR Transactions on Symmetric Cryptology, 2018
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez   +6 more
doaj   +1 more source

Symmetric Hadamard matrices of order 116 and 172 exist

open access: yes, 2015
We construct new symmetric Hadamard matrices of orders $92,116$, and $172$. While the existence of those of order $92$ was known since 1978, the orders $116$ and $172$ are new. Our construction is based on a recent new combinatorial array discovered by N.
Di Matteo, Olivia   +2 more
core   +1 more source

Improving Cross-Lingual Word Embeddings by Meeting in the Middle [PDF]

open access: yesProceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, 2018
11 pages, 4 tables, 1 figure.
Doval, Yerai   +3 more
openaire   +3 more sources

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +3 more sources

Dipolar Interactions and Origin of Spin Ice in Ising Pyrochlore Magnets

open access: yes, 2000
Recent experiments suggest that the Ising pyrochlore magnets ${\rm Ho_{2}Ti_{2}O_{7}}$ and ${\rm Dy_{2}Ti_{2}O_{7}}$ display qualitative properties of the spin ice model proposed by Harris {\it et al.} \prl {\bf 79}, 2554 (1997).
A. P. Ramirez   +14 more
core   +1 more source

Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
The Nostradamus attack was originally proposed as a security vulnerability for a hash function by Kelsey and Kohno at EUROCRYPT 2006. It requires the attacker to commit to a hash value y of an iterated hash function H.
Xiaoyang Dong   +4 more
doaj   +1 more source

Optimizing Implementations of Lightweight Building Blocks

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We study the synthesis of small functions used as building blocks in lightweight cryptographic designs in terms of hardware implementations. This phase most notably appears during the ASIC implementation of cryptographic primitives.
Jérémy Jean   +3 more
doaj   +1 more source

Meet In The Middle Attack: A Cryptanalysis Approach

open access: yesInternational Journal of Computer Applications, 2010
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper are to find the two keys using cryptanalysis method, that is used for encrypting the information ...
Shish Ahmad   +3 more
openaire   +1 more source

Inverkip power station [PDF]

open access: yes, 2009
Architectural review of Inverkip Power Station. Inverkip power station is an oil-fired power station located on the eastern shore of the Firth of Clyde on the west coast of Scotland - between Inverkip and Wemyss Bay in Inverclyde.
Reat, D.
core   +1 more source

Home - About - Disclaimer - Privacy