Results 31 to 40 of about 10,586,295 (59)
SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc +1 more source
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
Jérémy Jean, I. Nikolic, Thomas Peyrin
semanticscholar +1 more source
Improving dependability with low power fault detection model for skinny-hash. [PDF]
Arvind Barge S, Mary GI.
europepmc +1 more source
Augmented sets of output differences and new distinguishers for SPN ciphers. [PDF]
Girme R, Rohit R, Sarkar S.
europepmc +1 more source
DCTN1-related neurodegeneration: Perry syndrome and beyond.
T. Konno +5 more
semanticscholar +1 more source
Non-coding RNAs: long non-coding RNAs and microRNAs in endocrine-related cancers.
C. Klinge
semanticscholar +1 more source
Medical management of secretory syndromes related to gastroenteropancreatic neuroendocrine tumours.
G. Dimitriadis +4 more
semanticscholar +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
Science China Information Sciences, 2019Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we seek a six-round related-tweakey impossible distinguisher of Deoxys-BC-256, which is transformed from a 3.5-round single-key impossible distinguisher of ...
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
openaire +2 more sources
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
International Conference on Cryptology in Africa, 2018This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
Yu Sasaki
openaire +2 more sources

