Results 61 to 70 of about 518,524 (183)
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang +4 more
doaj +1 more source
Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock
In this paper, we present preimage attacks on several hashing modes instantiating reduced-round LBlock. It is observed that the omission of the network twist in the last round and the diffusion of the permutation in round function are the key points for ...
Shiwei Chen, Chenhui Jin
doaj +1 more source
Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck
We apply McKay’s pseudo-linear approximation of addition modular 2n to lightweight ARX block ciphers with large words, specifically the Speck family. We demonstrate that a pseudo-linear approximation can be combined with a linear approximation using the ...
Sarah A. Alzakari, Poorvi L. Vora
doaj +1 more source
Through the Eye of a Needle: The Challenge of Providing Employment Services in New York's Chinatown Post September 11th [PDF]
Prepared for the US Department of Labor, this P/PV report evaluates the effectiveness of the National Emergency Grant (NEG) money awarded to organizations in Chinatown in the wake of September 11th.
Mark Elliott, Shayne Spaulding
core
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +3 more sources
News reports of the last few years indicated that several intelligence agencies are able to monitor large networks or entire portions of the Internet backbone. Such a powerful adversary has only recently been considered by the academic literature.
Ateniese, Giuseppe +4 more
core +1 more source
Spartan Daily, September 11, 2003 [PDF]
Volume 121, Issue 10https://scholarworks.sjsu.edu/spartandaily/9876/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +2 more sources
Improved Integral Attack on Reduced-Round Simeck
Simeck, a family of lightweight block ciphers utilizing Simon-like structure, is widely used under resource constrained environment. So far, many cryptanalysis methods have been used to attack Simeck.
Hang Li, Jiongjiong Ren, Shaozhen Chen
doaj +1 more source
Cryptanalysis of AES-PRF and Its Dual
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez +6 more
doaj +1 more source
Security Amplification against Meet-in-the-Middle Attacks Using Whitening [PDF]
In this paper we introduce a model for studying meet-in-the-middle attacks on block ci-phers, and a simple block cipher construction provably resistant to such attacks in this model. A side-result of this is a proper formalization for an unproven alternative to DESX proposed by Kilian and Rogaway; this construction can now be shown to be sound in our ...
Fouque, Pierre-Alain, Karpman, Pierre
openaire +2 more sources

