- Home
- » Tags
- » Boomerang attack
Top View
- Analysis of RC2
- HIGHT: a New Block Cipher Suitable for Low-Resource Device *
- Cryptanalysis of Symmetric Cryptographic Primitives
- View the Index
- Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V
- Impossible Differential Cryptanalysis of Reduced Round Hight
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller
- A Advanced Encryption Standard See AES AES 35–64 AES Process And
- Analysis of MARS
- Elastic Block Ciphers: Method, Security and Instantiations
- Slide Attacks on a Class of Hash Functions
- Combined Attacks — from Boomerangs to Sandwiches and Differential-Linear
- Boomerang Uniformity of Popular S-Box Constructions
- Boomerang Attacks on Hash Function Using Auxiliary Differentials
- New Combined Attacks on Block Ciphers
- A Survey on the Cryptanalysis of the Advanced Encryption Standard
- The Rectangle Attack and Other Techniques for Cryptanalysis of Block Ciphers
- Conference Report THIRD ADVANCED ENCRYPTION
- Udc 004.056.5 Srsti 81.93.29 Cryptographic Attack To
- Differential Cryptanalysis
- A Review on Combined Attacks on Security Systems
- Differential Cryptanalysis and Boomerang Cryptanalysis of Lblock Jiageng Chen, Atsuko Miyaji
- AES Variants Secure Against Related-Key Differential and Boomerang Attacks Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
- Related-Key Boomerang Attack on Block Cipher SQUARE
- A Differential Boomerang Attack Against 7-Round Rijndael
- Impossible-Differential and Boomerang Cryptanalysis of Round
- AES Public Comment from the Rijndael Team
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1*
- This Item Was Submitted to Loughborough's Institutional
- The Return of the Cryptographic Boomerang S
- The 128-Bit Blockcipher CLEFIA Security and Performance Evaluations
- Analysis of Boomerang Di Erential Trails Via a SAT-Based Constraint
- Few Other Cryptanalytic Techniques Objectives
- A Simple Related-Key Attack on the Full SHACAL-1
- A Few Techniques for Block Cipher Cryptanalysis
- The Boomerang Attack
- Ovely Rofessional Niversity L
- Cryptanalysis of Block Ciphers: a Survey
- Decorrelation Theory Aslı Bay I&C, EPFL
- Chosen-Plaintext Attack Ciphertext-Only Attack Known-Plaintext Attack