DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Boomerang attack

Boomerang attack

  • Improved Rectangle Attacks on SKINNY and CRAFT

    Improved Rectangle Attacks on SKINNY and CRAFT

  • Lecture Note 8 ATTACKS on CRYPTOSYSTEMS I Sourav Mukhopadhyay

    Lecture Note 8 ATTACKS on CRYPTOSYSTEMS I Sourav Mukhopadhyay

  • Hash Functions and the (Amplified) Boomerang Attack

    Hash Functions and the (Amplified) Boomerang Attack

  • Boomerang Analysis Method Based on Block Cipher

    Boomerang Analysis Method Based on Block Cipher

  • Report on the AES Candidates

    Report on the AES Candidates

  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1

    Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1

  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

    Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

  • Cryptanalysis of Block Ciphers

    Cryptanalysis of Block Ciphers

  • Differential-Linear Cryptanalysis Revisited

    Differential-Linear Cryptanalysis Revisited

  • Boomerang Connectivity Table: a New Cryptanalysis Tool

    Boomerang Connectivity Table: a New Cryptanalysis Tool

  • The Retracing Boomerang Attack

    The Retracing Boomerang Attack

  • SKINNY-AEAD and SKINNY-Hash Specification

    SKINNY-AEAD and SKINNY-Hash Specification

  • SEA a Scalable Encryption Algorithm for Small Embedded Applications

    SEA a Scalable Encryption Algorithm for Small Embedded Applications

  • Statistical Cryptanalysis of Block Ciphers

    Statistical Cryptanalysis of Block Ciphers

  • Amplified Boomerang Attack Against Reduced-Round SHACAL

    Amplified Boomerang Attack Against Reduced-Round SHACAL

  • Lecture Notes in Computer Science 2365 Edited by G

    Lecture Notes in Computer Science 2365 Edited by G

  • A Tale of Boomerang Attacks Paul HUYNH Advisor: Marine MINIER Team Caramba, LORIA, Université De Lorraine

    A Tale of Boomerang Attacks Paul HUYNH Advisor: Marine MINIER Team Caramba, LORIA, Université De Lorraine

  • On the Feistel Counterpart of the Boomerang Connectivity Table Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier

    On the Feistel Counterpart of the Boomerang Connectivity Table Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier

Top View
  • Analysis of RC2
  • HIGHT: a New Block Cipher Suitable for Low-Resource Device *
  • Cryptanalysis of Symmetric Cryptographic Primitives
  • View the Index
  • Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V
  • Impossible Differential Cryptanalysis of Reduced Round Hight
  • Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller
  • A Advanced Encryption Standard See AES AES 35–64 AES Process And
  • Analysis of MARS
  • Elastic Block Ciphers: Method, Security and Instantiations
  • Slide Attacks on a Class of Hash Functions
  • Combined Attacks — from Boomerangs to Sandwiches and Differential-Linear
  • Boomerang Uniformity of Popular S-Box Constructions
  • Boomerang Attacks on Hash Function Using Auxiliary Differentials
  • New Combined Attacks on Block Ciphers
  • A Survey on the Cryptanalysis of the Advanced Encryption Standard
  • The Rectangle Attack and Other Techniques for Cryptanalysis of Block Ciphers
  • Conference Report THIRD ADVANCED ENCRYPTION


© 2024 Docslib.org    Feedback