Results 31 to 40 of about 10,586,295 (59)

SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]

open access: yesSensors (Basel), 2020
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc   +1 more source

Tweaks and Keys for Block Ciphers: The TWEAKEY Framework

open access: yesInternational Conference on the Theory and Application of Cryptology and Information Security, 2014
Jérémy Jean, I. Nikolic, Thomas Peyrin
semanticscholar   +1 more source

DCTN1-related neurodegeneration: Perry syndrome and beyond.

open access: yesParkinsonism & Related Disorders, 2017
T. Konno   +5 more
semanticscholar   +1 more source

Medical management of secretory syndromes related to gastroenteropancreatic neuroendocrine tumours.

open access: yesEndocrine-Related Cancer, 2016
G. Dimitriadis   +4 more
semanticscholar   +1 more source

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256

Science China Information Sciences, 2019
Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we seek a six-round related-tweakey impossible distinguisher of Deoxys-BC-256, which is transformed from a 3.5-round single-key impossible distinguisher of ...
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire   +2 more sources

Improved Related-Tweakey Boomerang Attacks on Deoxys-BC

International Conference on Cryptology in Africa, 2018
This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
Yu Sasaki
openaire   +2 more sources

Home - About - Disclaimer - Privacy