Results 201 to 210 of about 34,576 (259)
Electrochemical conversion of oxalic acid to glycolic acid via oxygen vacancy-mediated tandem catalysis. [PDF]
Li M +5 more
europepmc +1 more source
Haemodynamic determinants of supine hypertension in patients with classical orthostatic hypotension. [PDF]
van der Stam AH +8 more
europepmc +1 more source
The Mouse Social Frailty Index (mSFI): A Standardized Protocol. [PDF]
Collinge CW, Razzoli M, Bartolomucci A.
europepmc +1 more source
Improved Related-Key Rectangle Attacks On GIFT
Abstract GIFT is a lightweight cipher proposed by Banik et al. at CHES’17, motivated by the design strategy of PRESENT. GIFT-64[2021] is a variant of GIFT proposed by Sun et al. at EUROCRYPT’22 to achieve better resistance against differential attack while maintaining a similar security level against linear attack.
Qingyuan Yu +3 more
openalex +2 more sources
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
Based on the compression function of the hash function standard SHA-256, SHACAL-2 is a 64-round block cipher with a 256-bit block size and a variable length key of up to 512 bits. In this paper, we present a related-key rectangle attack on 42-round SHACAL-2, which requires 2243.38 related-key chosen plaintexts and has a running time of 2488.37. This is
Jiadong Lu, Jeongchang Kim
+6 more sources
Related-key rectangle attack on 42-round SHACAL-2
SHACAL-2 is a 256-bit block cipher with up to 512 bits of key length based on the hash function SHA-2. It was recommended as one of the NESSIE projection selections. As far as the number of the attacked rounds is concerned, the best cryptanalytic result obtained on SHACAL-2 so far is the analysis of a related-key rectangle attack on the 42-round SHACAL-
Jiqiang Lu +3 more
+4 more sources
Integral Attack on Reduced-Round Rectangle
RECTANGLE is a 64-bit block cipher with 80 and 128-bit key length proposed by Zhang et al(Lightweight Cryptography Workshop 2015). Integral attack is one of the typical evaluation tools of block cipher. The designers showed 7-round integral distinguisher.
Haruhisa Kosuge +3 more
openalex +2 more sources
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher
Khudra is a block cipher proposed in the SPACE’2014 conference, whose main design goal is to achieve suitability for the increasingly popular Field Programmable Gate Array (FPGA) implementation. It is an 18-round lightweight cipher based on recursive Feistel structure, with a 64-bit block size and 80-bit key size.
Xiaoshuang Ma, Kexin Qiao
+4 more sources
Countering overlapping rectangle privacy attack for moving kNN queries
An important class of LBSs is supported by the moving k nearest neighbor (MkNN) query, which continuously returns the k nearest data objects for a moving user. For example, a tourist may want to observe the five nearest restaurants continuously while exploring a city so that she can drop in to one of them anytime.
Tanzima Hashem, Lars Kulik, Rui Zhang
openalex +2 more sources
Improved Rectangle Attack on SMS4 Reduced to 18 Rounds
SMS4 is a 32-round block cipher with 128-bit block size and 128-bit secret key. It is used in WAPI, the Chinese WLAN national standard. In this paper, we analyze the security of SMS4 against the rectangle attack. First we describe two properties of SMS4. Next, we propose the 16-round rectangle distinguisher with probability 2-250.
Xianglong Kong, Wei Wang, Qiuliang Xu
openalex +2 more sources

