Results 1 to 10 of about 34,466 (227)

Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC

open access: yesIET Information Security, 2023
Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys‐II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition.
Jiamei Liu, Lin Tan, Hong Xu
doaj   +2 more sources

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +2 more sources

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin   +4 more
doaj   +1 more source

Improved Rectangle Attacks on SKINNY and CRAFT

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +1 more source

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search is not always satisfactory for the search of long trails or ciphers with large state sizes ...
Ling Su, Wei Wang, Meiqin Wang
doaj   +1 more source

A Formal Analysis of Boomerang Probabilities

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying ...
Andreas B. Kidmose, Tyge Tiessen
doaj   +1 more source

On Boomerang Attacks on Quadratic Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers.
Xavier Bonnetain, Virginie Lallemand
doaj   +1 more source

Exploring Differential-Based Distinguishers and Forgeries for ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with ...
David Gerault   +2 more
doaj   +1 more source

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +1 more source

Analysis of added mass in cavitating flow [PDF]

open access: yes, 2012
The paper addresses a theoretical study of the added mass effect in cavitating flow.The cavitation is considered to induce a strong time–space variation of the fluid density at the interface between an inviscid fluid and a three-degree-of-freedom rigid ...
ASTOLFI, Jacques Andre   +1 more
core   +6 more sources

Home - About - Disclaimer - Privacy