Results 61 to 70 of about 518,524 (183)

Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

open access: yesJournal of Applied Mathematics, 2013
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang   +4 more
doaj   +1 more source

Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock

open access: yesIEEE Access, 2018
In this paper, we present preimage attacks on several hashing modes instantiating reduced-round LBlock. It is observed that the omission of the network twist in the last round and the diffusion of the permutation in round function are the key points for ...
Shiwei Chen, Chenhui Jin
doaj   +1 more source

Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck

open access: yesCryptography, 2020
We apply McKay’s pseudo-linear approximation of addition modular 2n to lightweight ARX block ciphers with large words, specifically the Speck family. We demonstrate that a pseudo-linear approximation can be combined with a linear approximation using the ...
Sarah A. Alzakari, Poorvi L. Vora
doaj   +1 more source

Through the Eye of a Needle: The Challenge of Providing Employment Services in New York's Chinatown Post September 11th [PDF]

open access: yes, 2003
Prepared for the US Department of Labor, this P/PV report evaluates the effectiveness of the National Emergency Grant (NEG) money awarded to organizations in Chinatown in the wake of September 11th.
Mark Elliott, Shayne Spaulding
core  

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +3 more sources

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position

open access: yes, 2015
News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature.
Ateniese, Giuseppe   +4 more
core   +1 more source

Spartan Daily, September 11, 2003 [PDF]

open access: yes, 2002
Volume 121, Issue 10https://scholarworks.sjsu.edu/spartandaily/9876/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +2 more sources

Improved Integral Attack on Reduced-Round Simeck

open access: yesIEEE Access, 2019
Simeck, a family of lightweight block ciphers utilizing Simon-like structure, is widely used under resource constrained environment. So far, many cryptanalysis methods have been used to attack Simeck.
Hang Li, Jiongjiong Ren, Shaozhen Chen
doaj   +1 more source

Cryptanalysis of AES-PRF and Its Dual

open access: yesIACR Transactions on Symmetric Cryptology, 2018
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez   +6 more
doaj   +1 more source

Security Amplification against Meet-in-the-Middle Attacks Using Whitening [PDF]

open access: yes, 2013
In this paper we introduce a model for studying meet-in-the-middle attacks on block ci-phers, and a simple block cipher construction provably resistant to such attacks in this model. A side-result of this is a proper formalization for an unproven alternative to DESX proposed by Kilian and Rogaway; this construction can now be shown to be sound in our ...
Fouque, Pierre-Alain, Karpman, Pierre
openaire   +2 more sources

Home - About - Disclaimer - Privacy