Results 41 to 50 of about 518,524 (183)

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

A New Meet-in-the-Middle Attack on the IDEA Block Cipher [PDF]

open access: yes, 2004
In this paper we introduce a novel meet-in-the-middle attack on the IDEA block cipher. The attack consists of a precomputation and an elimination phase. The attack reduces the number of required plaintexts significantly for 4 and 4.5 rounds, and, to the best of our knowledge, it is the first attack on the 5-round IDEA.
Demirci H., Selçuk, A.A., Türe, E.
openaire   +3 more sources

New Meet-in-the-Middle Attacks on FOX Block Cipher

open access: yesThe Computer Journal, 2022
Abstract FOX block cipher was designed with a Lai–Massey scheme, in which the round function uses the Substitution-Permutation-Substitution structure. A meet-in-the-middle (MITM) attack is one of the most important issues for the security of the block cipher, which consists of a precomputation phase for constructing a distinguisher and ...
Xiaoli Dong   +3 more
openaire   +1 more source

Improved Meet-In-The-Middle Attacks On Aes

open access: yes, 2009
We improve the existing distinguishers of AES. Our work is mainly built upon the works by Gilbert& Miner [17] and Demirci & Selcuk [14]. We find out that some part of the inner encryption function of AES can be expressed with relatively few constants under certain conditions.
Demirci, Hueseyin   +3 more
openaire   +3 more sources

SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu   +4 more
doaj   +1 more source

Secure Positioning of Mobile Terminals with Simplex Radio Communication [PDF]

open access: yes, 2006
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings.
Fujii, Mikio
core   +2 more sources

Meet-in-the-Middle Attacks on Generic Feistel Constructions [PDF]

open access: yes, 2014
We show key recovery attacks on generic balanced Feistel ciphers. The analysis is based on the meet-in-the-middle technique and exploits truncated differentials that are present in the ciphers due to the Feistel construction. Depending on the type of round function, we differentiate and show attacks on two types of Feistels.
Jian Guo   +3 more
openaire   +1 more source

A Meet-in-the-middle Attack Method of Deoxys-BC [PDF]

open access: yesJisuanji kexue
The Deoxys-BC adopting the SPN structure and TWEAK framework is a lightweight tweakable block cipher published at ASIACRPYPT 2014.By researching the internal characteristic and key schedule of the Deoxys-BC,a 6-round meet-in-the-middle distinguisher ...
LI Zheng, LI Manman, CHEN Shaozhen
doaj   +1 more source

“The Development of an Unbeatable Combination”: US Close Air Support in Normandy [PDF]

open access: yes, 2012
In the climactic scene of the highly-acclaimed Saving Private Ryan, the beleaguered Ranger and Airborne forces of Captain John Miller (Tom Hanks) are about to be overrun.
Bechthold, Michael
core   +1 more source

Home - About - Disclaimer - Privacy