Results 71 to 80 of about 454,487 (179)

Improved preimage and pseudo-collision attacks on SM3 hash function

open access: yesTongxin xuebao, 2018
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known ...
Jian ZOU, Le DONG
doaj   +2 more sources

Cross-Cultural Medicine in the Middle East at the Start of the 21st Century: Where East and West Meet

open access: yesThe Scientific World Journal, 2006
The “global village” has resulted in the need to tackle cross-cultural issues in the medical school curriculum. The southern region of Israel (the Negev) provides a unique opportunity to study the interaction between medicine and culture.
Jacob Urkin   +3 more
doaj   +1 more source

A Known-Plaintext Attack with Minimal Data Complexity on 25-Round CRAFT

open access: yesIACR Transactions on Symmetric Cryptology
We present the first known-plaintext attack on up to 25 rounds of the tweakable block cipher Craft. These attacks require only two known plaintextciphertext pairs to recover the full key, and work independent of the used tweaks.
Eran Lambooij, Patrick Neumann
doaj   +1 more source

Improved Cryptanalysis of GIFT-64

open access: yesIACR Transactions on Symmetric Cryptology
In this paper, we propose new differential attacks against the block cipher GIFT-64. First we demonstrate how the parallel matching algorithm proposed by Naya-Plasencia at CRYPTO’11 as an advanced list-merging algorithm can be leveraged to enhance ...
Patrick Derbez   +3 more
doaj   +1 more source

ABIONAN AND EXU MEET IN THE MIDDLE OF THE WAY: THE UNFOLDING OF THE NOVEL INTO A TRIOLOGY, IN ANTONIO OLINTO

open access: yesRevista Brasileira de Literatura Comparada, 2023
This piece has the literary series Soul of Africa, by Antonio Olinto, as its object of study and investigates the mechanisms that operate an internal requirement of the narrative language, responsible for promoting the unfolding of the Olinto novel into ...
Luís Henrique da Silva Novais
doaj  

ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]

open access: yes
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core  

Improved meet-in-the-middle attack on Joltik-BC-128

open access: yes网络与信息安全学报
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng   +3 more
doaj  

Improved Meet-In-The-Middle Attacks On Aes

open access: yes, 2009
We improve the existing distinguishers of AES. Our work is mainly built upon the works by Gilbert& Miner [17] and Demirci & Selcuk [14]. We find out that some part of the inner encryption function of AES can be expressed with relatively few constants under certain conditions.
Demirci, Hueseyin   +3 more
openaire   +3 more sources

On the Complexity of Implementation Some Cryptanalysis Methods by Distributed Computing

open access: yesБезопасность информационных технологий, 2011
The subject of the research is an investigation on the distributed computing efficiency in the analysis of cryptographic systems by different key search methods: meet-in-the-middle, sequential key search and Hellman method.
A. A. Varfolomeev   +3 more
doaj  

Home - About - Disclaimer - Privacy