Results 11 to 20 of about 518,524 (183)

Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +3 more sources

Meet-in-the-Middle Attacks on Reduced-Round XTEA [PDF]

open access: yes, 2011
Summary: The block cipher GOST (GOST 28147-89) is a Russian standard for encryption and message authentication that is included in OpenSSL 1.0.0. In this paper, we present meet-in-the-middle attacks on several block ciphers, each consisting of 22 or fewer rounds of GOST.
Sekar, Gautham   +3 more
openaire   +3 more sources

Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search

open access: yesIET Information Security, 2023
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +1 more source

Time-Memory Analysis of Parallel Collision Search Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Parallel versions of collision search algorithms require a significant amount of memory to store a proportion of the points computed by the pseudo-random walks.
Monika Trimoska   +2 more
doaj   +1 more source

A novel security analysis for a new NTRU variant with additional private key [PDF]

open access: yesInternational Journal of Data and Network Science, 2023
This paper proposes a new variant of NTRU with a slightly different critical formulation. The significance of this new variant is that it requires an additional private key to provide a tighter scheme.
Nurshamimi Salleh   +2 more
doaj   +1 more source

A Meet-in-the-Middle Attack on 8-Round AES [PDF]

open access: yes, 2008
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES-192 and 8 rounds of AES-256. We also give a time-memory tradeoff generalization of the basic attack which gives a better balancing between different costs of the attack.
Demirci, Hueseyin, Selcuk, Ali Aydin
openaire   +3 more sources

An Active Attack on a Multiparty Key Exchange Protocol [PDF]

open access: yes, 2015
The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks.
Lopez-Ramos, Juan Antonio   +3 more
core   +4 more sources

Tunisia : mass tourism in crisis? [PDF]

open access: yes, 2017
Successive governments in post-colonial Tunisia have sought to develop mass tourism as an avenue for social and economic development. Political instability and increasing media coverage have more recently led to a dramatic reduction in foreign tourist ...
Bleasdale, Sue, Jeffrey, Heather
core   +3 more sources

Meet In The Middle Attack: A Cryptanalysis Approach

open access: yesInternational Journal of Computer Applications, 2010
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper are to find the two keys using cryptanalysis method, that is used for encrypting the information ...
Shish Ahmad   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy