Results 61 to 70 of about 454,487 (179)

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Middle Level Faculty and Change

open access: yesCurrent Issues in Middle Level Education, 2020
There is no argument that the world of middle level education is constantly changing. Teacher education programs are always in flux adopting their programs to meet these needs. Faculty who teach within a middle level education teacher preparation program
Robin Dever
doaj   +1 more source

Electron transport through single conjugated organic molecules: Basis set effects in ab initio calculations

open access: yes, 2007
We investigate electron transport through single conjugated molecules - including benzenedithiol, oligo-phenylene-ethynylenes of different lengths, and a ferrocene-containing molecule sandwiched between two gold electrodes with different contact ...
Baranger, Harold U.   +2 more
core   +1 more source

Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]

open access: yes, 2011
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core  

Preimage and pseudo collision attacks on round-reduced DHA-256 hash function

open access: yesTongxin xuebao, 2013
A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage ...
Jian ZOU   +3 more
doaj   +2 more sources

Smart buildings need smart consumers: the meet-in-the middle approach towards sustainable management of energy sources

open access: yesInternational Journal of Sustainable Energy, 2020
Sustainable management of energy resources is a challenge which our society faces at economic, environmental and political levels. Smart homes are central in recent technology; however, the smart buildings concept cannot stand on its own. Smart buildings
Christos Vlachokostas
doaj   +1 more source

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expanding Feistels.
Jian Guo   +3 more
doaj   +1 more source

Per- and polyfluoroalkyl substance (PFAS) exposure, maternal metabolomic perturbation, and fetal growth in African American women: A meet-in-the-middle approach. [PDF]

open access: yesEnviron Int, 2022
Chang CJ   +14 more
europepmc   +1 more source

SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu   +4 more
doaj   +1 more source

A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack

open access: yesJournal of Mathematical Cryptology, 2019
Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more.
Wunderer Thomas
doaj   +1 more source

Home - About - Disclaimer - Privacy