Results 201 to 210 of about 34,466 (227)
Some of the next articles are maybe not open access.

Related-Key Rectangle Attack on 42-Round SHACAL-2

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006
Based on the compression function of the hash function standard SHA-256, SHACAL-2 is a 64-round block cipher with a 256-bit block size and a variable length key of up to 512 bits. In this paper, we present a related-key rectangle attack on 42-round SHACAL-2, which requires 2243.38 related-key chosen plaintexts and has a running time of 2488.37. This is
Lu, J.   +3 more
  +6 more sources

Improved Related-Key Rectangle Attacks On GIFT

The Computer Journal, 2023
Abstract GIFT is a lightweight cipher proposed by Banik et al. at CHES’17, motivated by the design strategy of PRESENT. GIFT-64[2021] is a variant of GIFT proposed by Sun et al. at EUROCRYPT’22 to achieve better resistance against differential attack while maintaining a similar security level against linear attack.
Qingyuan Yu   +3 more
openaire   +1 more source

Dividing rectangles attack multi-objective optimization

2016 IEEE Congress on Evolutionary Computation (CEC), 2016
Decomposition-based evolutionary algorithms have been applied with success to multi-objective optimization problems where they are broken into several subproblems, and solutions for the original problem are recognized in a coordinated manner. Motivated by the working principle of decomposition-based methods, viz. the “divide-and-conquer” paradigm; this
Abdullah Al-Dujaili, S. Suresh
openaire   +1 more source

Integral Attack on Reduced-Round Rectangle

2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
RECTANGLE is a 64-bit block cipher with 80 and 128-bit key length proposed by Zhang et al(Lightweight Cryptography Workshop 2015). Integral attack is one of the typical evaluation tools of block cipher. The designers showed 7-round integral distinguisher.
Haruhisa Kosuge   +3 more
openaire   +1 more source

Rectangle Algebraic Attack of Serpent Encryption Algorithm

2010 International Symposium on Intelligence Information Processing and Trusted Computing, 2010
After exploring multi-round difference feature of Serpent encryption algorithm and using the method of constructing S-boxes algebraic equations, we put forward Rectangle algebraic attack of 10-round Serpent-256. This method analyzed that 10-round Serpent-256 needed 2×2144 ×210 = 2155 pairs of selective plaintexts, 2155 times of 10-round encryption and ...
Wenlue Chen, Boli Li, Zhihua Hu
openaire   +1 more source

Countering overlapping rectangle privacy attack for moving kNN queries

Information Systems, 2013
An important class of LBSs is supported by the moving k nearest neighbor (MkNN) query, which continuously returns the k nearest data objects for a moving user. For example, a tourist may want to observe the five nearest restaurants continuously while exploring a city so that she can drop in to one of them anytime.
Tanzima Hashem, Lars Kulik, Rui Zhang
openaire   +1 more source

Improved Rectangle Attack on SMS4 Reduced to 18 Rounds

2013 Ninth International Conference on Computational Intelligence and Security, 2013
SMS4 is a 32-round block cipher with 128-bit block size and 128-bit secret key. It is used in WAPI, the Chinese WLAN national standard. In this paper, we analyze the security of SMS4 against the rectangle attack. First we describe two properties of SMS4. Next, we propose the 16-round rectangle distinguisher with probability 2-250.
Xianglong Kong, Wei Wang, Qiuliang Xu
openaire   +1 more source

Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis

IEEE Transactions on Information Theory, 2012
In 2004, we introduced the related-key boomerang/ rectangle attacks, which allow us to enjoy the benefits of the boomerang attack and the related-key technique, simultaneously. The new attacks were used since then to attack numerous block ciphers. While the claimed applications are significant, most of them have a major drawback.
Jongsung Kim   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy