Results 11 to 20 of about 34,466 (227)

Related-key rectangle attack on the full ARIRANG encryption mode

open access: yesTongxin xuebao, 2011
The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round ...
ZHANG Peng1, LI Rui-lin1, LI Chao1
doaj   +3 more sources

New related-key rectangle attack on 42-round SHACAL-2

open access: yesTongxin xuebao, 2009
A new 34-round related-key rectangle distinguisher was constructed by exploiting the properties of the round transform of SHACAL-2. Moreover, two new relate-key rectangle attacks on 40-round and 42-round reduced SHACAL-2 were presented by using both the ...
WEI Yong-zhuang1, 2
doaj   +3 more sources

Rectangle Attacks on 49-Round SHACAL-1 [PDF]

open access: yes, 2003
SHACAL-1 is a 160-bit block cipher with variable key length of up to 512-bit key based on the hash function SHA-1. It was submitted to the NESSIE project and was accepted as a finalist for the 2nd phase of the evaluation. In this paper we present rectangle attacks on 49 rounds out of the 80 rounds of SHACAL-1.
Eli Biham, Orr Dunkelman, Nathan Keller
  +11 more sources

New Rectangle Attack Against SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The issue of security and privacy plays an important role in the wireless networks and directly affects the wide application of wireless network systems. In order to protect the confidentiality of data for wireless networks, especially for the wireless sensor networks, a series of lightweight ciphers have been proposed in recent years. SKINNY, a family
Jiyan Zhang, Ting Cui, Chenhui Jin
openaire   +4 more sources

The Rectangle Attack — Rectangling the Serpent [PDF]

open access: yes, 2001
Serpent is one of the 5 AES finalists. The best attack published so far analyzes up to 9 rounds. In this paper we present attacks on 7-round, 8-round, and 10-round variants of Serpent. We attack a 7- round variant with all key lengths, and 8- and 10-round variants with 256-bit keys. The 10-round attack on the 256-bit keys variants is the best published
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection

open access: yes2021 IEEE/CVF International Conference on Computer Vision (ICCV), 2021
8 pages, 5 ...
Liang, Siyuan   +4 more
openaire   +2 more sources

Related-Key Boomerang and Rectangle Attacks [PDF]

open access: yes, 2005
The boomerang attack and the rectangle attack are two attacks that utilize differential cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub-ciphers, where there exists a good differential for each sub-cipher, but not for the entire cipher.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs [PDF]

open access: yes, 2016
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider ...
Ambrosin, M   +3 more
core   +2 more sources

Security Analysis of SKINNY under Related-Tweakey Settings

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-n-t, where n represents the block size and t represents the tweakey length, the design specifies t ∈ {n, 2n, 3n}. In this
Guozhen Liu, Mohona Ghosh, Ling Song
doaj   +1 more source

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy