Results 1 to 10 of about 34,576 (259)

Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC [PDF]

open access: goldIET Information Security, 2023
Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys‐II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition.
Jiamei Liu, Lin Tan, Hong Xu
doaj   +3 more sources

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: diamondIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +4 more sources

Related-Key Rectangle Attack on the Full SHACAL-1 [PDF]

open access: bronze, 2007
SHACAL-1 is a 160-bit block cipher with variable key length of up to 512-bit key based on the hash function SHA-1. It was submitted to the NESSIE project and was accepted as a finalist for the 2nd phase of the evaluation. In this paper we present rectangle attacks on 49 rounds out of the 80 rounds of SHACAL-1.
Orr Dunkelman   +2 more
  +12 more sources

New related-key rectangle attack on 42-round SHACAL-2

open access: closedTongxin xuebao, 2009
A new 34-round related-key rectangle distinguisher was constructed by exploiting the properties of the round transform of SHACAL-2. Moreover, two new relate-key rectangle attacks on 40-round and 42-round reduced SHACAL-2 were presented by using both the ...
WEI Yong-zhuang1, 2
doaj   +4 more sources

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

open access: diamondIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +4 more sources

Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection [PDF]

open access: green2021 IEEE/CVF International Conference on Computer Vision (ICCV), 2022
8 pages, 5 ...
Siyuan Liang   +4 more
openalex   +3 more sources

Improved Rectangle Attacks on SKINNY and CRAFT

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +3 more sources

The Rectangle Attack — Rectangling the Serpent [PDF]

open access: bronze, 2001
Serpent is one of the 5 AES finalists. The best attack published so far analyzes up to 9 rounds. In this paper we present attacks on 7-round, 8-round, and 10-round variants of Serpent. We attack a 7- round variant with all key lengths, and 8- and 10-round variants with 256-bit keys. The 10-round attack on the 256-bit keys variants is the best published
Eli Biham, Orr Dunkelman, Nathan Keller
  +4 more sources

Related-Key Boomerang and Rectangle Attacks [PDF]

open access: bronze, 2005
The boomerang attack and the rectangle attack are two attacks that utilize differential cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub-ciphers, where there exists a good differential for each sub-cipher, but not for the entire cipher.
Eli Biham, Orr Dunkelman, Nathan Keller
openalex   +2 more sources

Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 [PDF]

open access: bronze, 2007
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-round reduced AES-192 with 64 or 256 related keys and 9-round reduced AES-256 with 4 related keys.
Jongsung Kim, Seokhie Hong, Bart Preneel
openalex   +2 more sources

Home - About - Disclaimer - Privacy