Results 11 to 20 of about 518,524 (183)
Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +3 more sources
Meet-in-the-Middle Attacks on Reduced-Round XTEA [PDF]
Summary: The block cipher GOST (GOST 28147-89) is a Russian standard for encryption and message authentication that is included in OpenSSL 1.0.0. In this paper, we present meet-in-the-middle attacks on several block ciphers, each consisting of 22 or fewer rounds of GOST.
Sekar, Gautham +3 more
openaire +3 more sources
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +1 more source
Time-Memory Analysis of Parallel Collision Search Algorithms
Parallel versions of collision search algorithms require a significant amount of memory to store a proportion of the points computed by the pseudo-random walks.
Monika Trimoska +2 more
doaj +1 more source
A novel security analysis for a new NTRU variant with additional private key [PDF]
This paper proposes a new variant of NTRU with a slightly different critical formulation. The significance of this new variant is that it requires an additional private key to provide a tighter scheme.
Nurshamimi Salleh +2 more
doaj +1 more source
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN [PDF]
status ...
Bogdanov, Andrey, Rechberger, Christian
core +2 more sources
A Meet-in-the-Middle Attack on 8-Round AES [PDF]
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES-192 and 8 rounds of AES-256. We also give a time-memory tradeoff generalization of the basic attack which gives a better balancing between different costs of the attack.
Demirci, Hueseyin, Selcuk, Ali Aydin
openaire +3 more sources
An Active Attack on a Multiparty Key Exchange Protocol [PDF]
The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks.
Lopez-Ramos, Juan Antonio +3 more
core +4 more sources
Tunisia : mass tourism in crisis? [PDF]
Successive governments in post-colonial Tunisia have sought to develop mass tourism as an avenue for social and economic development. Political instability and increasing media coverage have more recently led to a dramatic reduction in foreign tourist ...
Bleasdale, Sue, Jeffrey, Heather
core +3 more sources
Meet In The Middle Attack: A Cryptanalysis Approach
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper are to find the two keys using cryptanalysis method, that is used for encrypting the information ...
Shish Ahmad +3 more
openaire +1 more source

