Results 51 to 60 of about 454,487 (179)
Meet-in-the-middle attack on 11-round 3D cipher
A new 6-round meet-in-the-middle distinguisher was constructed by introducing multiset,making use of properties of the S-box was proposed and the truncated differential characteristic.Based on the distinguisher,a meet-in-the-middle attack on 11-round 3D ...
Jiong-jiong REN, Shao-zhen CHEN
doaj +2 more sources
Cryptanalysis of AES-PRF and Its Dual
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez +6 more
doaj +1 more source
Symmetric Hadamard matrices of order 116 and 172 exist
We construct new symmetric Hadamard matrices of orders $92,116$, and $172$. While the existence of those of order $92$ was known since 1978, the orders $116$ and $172$ are new. Our construction is based on a recent new combinatorial array discovered by N.
Di Matteo, Olivia +2 more
core +1 more source
Improving Cross-Lingual Word Embeddings by Meeting in the Middle [PDF]
11 pages, 4 tables, 1 figure.
Doval, Yerai +3 more
openaire +3 more sources
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +3 more sources
Dipolar Interactions and Origin of Spin Ice in Ising Pyrochlore Magnets
Recent experiments suggest that the Ising pyrochlore magnets ${\rm Ho_{2}Ti_{2}O_{7}}$ and ${\rm Dy_{2}Ti_{2}O_{7}}$ display qualitative properties of the spin ice model proposed by Harris {\it et al.} \prl {\bf 79}, 2554 (1997).
A. P. Ramirez +14 more
core +1 more source
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
The Nostradamus attack was originally proposed as a security vulnerability for a hash function by Kelsey and Kohno at EUROCRYPT 2006. It requires the attacker to commit to a hash value y of an iterated hash function H.
Xiaoyang Dong +4 more
doaj +1 more source
Optimizing Implementations of Lightweight Building Blocks
We study the synthesis of small functions used as building blocks in lightweight cryptographic designs in terms of hardware implementations. This phase most notably appears during the ASIC implementation of cryptographic primitives.
Jérémy Jean +3 more
doaj +1 more source
Meet In The Middle Attack: A Cryptanalysis Approach
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper are to find the two keys using cryptanalysis method, that is used for encrypting the information ...
Shish Ahmad +3 more
openaire +1 more source
Architectural review of Inverkip Power Station. Inverkip power station is an oil-fired power station located on the eastern shore of the Firth of Clyde on the west coast of Scotland - between Inverkip and Wemyss Bay in Inverclyde.
Reat, D.
core +1 more source

