Boomerang attack

Results: 40



#Item
1

Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-31 13:50:35
    2Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

    Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-22 23:59:39
    3Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

    The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

    Add to Reading List

    Source URL: www.sony.co.jp

    Language: English - Date: 2011-03-09 03:41:21
    4Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

    PDF Document

    Add to Reading List

    Source URL: www.sony.net

    Language: English - Date: 2011-03-18 00:53:23
    5SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

    improved_analysis_of_Shamata-BC.dvi

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-04 03:59:47
    6Serpent / ICE / Advanced Encryption Standard / Completeness / Chosen-plaintext attack / Crypt / Ciphertext / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

    Preliminary Cryptanalysis of Reduced-Round Serpent Tadayoshi Kohno1? , John Kelsey2 , and Bruce Schneier2 1 Reliable Software Technologies

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    7Cryptanalysis / Block cipher / MARS / DES-X / Crypt / Advantage / Differential cryptanalysis / Boomerang attack / Cryptography / Data Encryption Standard / Advanced Encryption Standard

    MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants John Kelsey and Bruce Schneier Counterpane Internet Security, Inc., 3031 Tisch Way, San Jose, CA 95128 {kelsey,schneier}@counterpane.com

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    8Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / International Data Encryption Algorithm / Key schedule / ICE / KASUMI / Tiny Encryption Algorithm / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

    Cryptanalysis of Full PRIDE Block Cipher Yibin Dai and Shaozhen Chen State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China Zhengzhou Information Science and Technology Institute

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-09 23:36:44
    9Differential cryptanalysis / Block cipher / Impossible differential cryptanalysis / E0 / Cryptanalysis / Known-plaintext attack / Chosen-plaintext attack / Advanced Encryption Standard / Ciphertext / Cryptography / Espionage / Boomerang attack

    Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1 Counterpane Internet Security, Inc.

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    10Advanced Encryption Standard / Cryptanalysis / Crypt / Advantage / Chosen-plaintext attack / Block cipher / Stream ciphers / Boomerang attack / Data Encryption Standard / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

    Cryptanalysis of Round-Reduced LED Ivica Nikoli´c, Lei Wang and Shuang Wu Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore {inikolic,wang.lei,w

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-05-05 23:11:43
    UPDATE