Results 61 to 70 of about 454,487 (179)
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj +2 more sources
Middle Level Faculty and Change
There is no argument that the world of middle level education is constantly changing. Teacher education programs are always in flux adopting their programs to meet these needs. Faculty who teach within a middle level education teacher preparation program
Robin Dever
doaj +1 more source
We investigate electron transport through single conjugated molecules - including benzenedithiol, oligo-phenylene-ethynylenes of different lengths, and a ferrocene-containing molecule sandwiched between two gold electrodes with different contact ...
Baranger, Harold U. +2 more
core +1 more source
Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage ...
Jian ZOU +3 more
doaj +2 more sources
Sustainable management of energy resources is a challenge which our society faces at economic, environmental and political levels. Smart homes are central in recent technology; however, the smart buildings concept cannot stand on its own. Smart buildings
Christos Vlachokostas
doaj +1 more source
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expanding Feistels.
Jian Guo +3 more
doaj +1 more source
Per- and polyfluoroalkyl substance (PFAS) exposure, maternal metabolomic perturbation, and fetal growth in African American women: A meet-in-the-middle approach. [PDF]
Chang CJ +14 more
europepmc +1 more source
SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu +4 more
doaj +1 more source
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more.
Wunderer Thomas
doaj +1 more source

