Results 211 to 220 of about 34,466 (227)
Some of the next articles are maybe not open access.
Quantum rectangle attack and its application on Deoxys-BC
Designs, Codes and CryptographyzbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xu, Yin-Song +6 more
openaire +2 more sources
Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher
2015Khudra is a block cipher proposed in the SPACE’2014 conference, whose main design goal is to achieve suitability for the increasingly popular Field Programmable Gate Array (FPGA) implementation. It is an 18-round lightweight cipher based on recursive Feistel structure, with a 64-bit block size and 80-bit key size.
Xiaoshuang Ma, Kexin Qiao
openaire +1 more source
New related-key rectangle attacks on reduced AES-192 and AES-256
Science in China Series F: Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wei, Yongzhuang, Hu, Yupu
openaire +2 more sources
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
Computer Standards & Interfaces, 2007Encryption algorithms that use the same secret key for encryption and decryption (also known as block ciphers) allow confidential information to be protected and accessible only by legitimate parties who have knowledge of that secret key. Before the public can be comfortable with using a block cipher, it needs to gain public trust on its level of ...
openaire +2 more sources
Improved Related-Key rectangle Attack on GIFT
2022 7th International Conference on Computer and Communication Systems (ICCCS), 2022Yaxin Cui, Hong Xu, Lin Tan
openaire +1 more source
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Journal of CryptologyzbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Qianqian +7 more
openaire +2 more sources
Related-key rectangle attack on 36 rounds of the XTEA block cipher
International Journal of Information Security, 2008XTEA is a 64-round block cipher with a 64-bit block size and a 128-bit user key, which was designed as a short C program that would run safely on most computers. In this paper, we present a related-key rectangle attack on a series of inner 36 rounds of XTEA without making a weak key assumption, and a related-key rectangle attack on the first 36 rounds ...
openaire +2 more sources
A Weak Key Class of XTEA for a Related-Key Rectangle Attack
2006XTEA is a block cipher with a very simple structure but there has not been found attack even for half of full round version i.e 32-round version. In this paper we introduce a class of weak keys which makes a 34-round reduced version of XTEA vulnerable to the related-key rectangle attack. The number of such weak keys is about 2108.21. Our attack on a 34-
Eunjin Lee +4 more
openaire +1 more source
Attack of the Black Rectangles by Amy Sarig King
Bulletin of the Center for Children's Books, 2022openaire +1 more source
Improved Related-Key Rectangle Attack Against the Full AES-192
2023Xuanyu Liang +5 more
openaire +1 more source

