Search

Your search keyword '"Boomerang attack"' showing total 487 results

Search Constraints

Start Over You searched for: Descriptor "Boomerang attack" Remove constraint Descriptor: "Boomerang attack"
487 results on '"Boomerang attack"'

Search Results

2. Quantum Truncated Differential and Boomerang Attack.

3. The Retracing Boomerang Attack, with Application to Reduced-Round AES.

4. Boomerang Attacks on Reduced-Round Midori64.

5. Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.

6. Quantum Truncated Differential and Boomerang Attack

7. The Triangle Differential Cryptanalysis

8. Truncated Boomerang Attacks and Application to AES-Based Ciphers

9. Automatic boomerang attacks search on Rijndael

10. A Low-Complexity Key-Recovery Attack on 6-Round Midori64.

11. Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery

12. Parallel Validity Analysis of the Boomerang Attack Model

13. Quantum Boomerang Attacks and Some Applications

14. Improved Rectangle and Boomerang Attacks on MIBS-64.

15. New results on quantum boomerang attacks.

16. On Boomerang Attacks on Quadratic Feistel Ciphers

17. Improved (Related-key) Differential Cryptanalysis on GIFT

18. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack

19. New Properties of the Double Boomerang Connectivity Table

20. Survey on recent trends towards generalized differential and boomerang uniformities.

21. Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

22. A Formal Analysis of Boomerang Probabilities

23. Improved Related-Tweakey Boomerang Attacks on Deoxys-BC

24. Boomerang Connectivity Table: A New Cryptanalysis Tool

25. On the Feistel Counterpart of the Boomerang Connectivity Table

26. On the boomerang uniformity of some permutation polynomials.

27. On the boomerang uniformity of quadratic permutations.

28. Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework

29. Boomerang Attack on Step-Reduced SHA-512

30. The Boomerang Attacks on BLAKE and BLAKE2

31. A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

32. New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

33. Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

34. Boomerang Connectivity Table Revisited. Application to SKINNY and AES

35. Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

36. Formal Analysis of Boomerang Probabilities

37. Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock

38. Related-Key Boomerang Attacks on KATAN32/48/64

39. Improved Boomerang Attacks on SM3

40. The Boomerang Attacks on the Round-Reduced Skein-512

41. Boomerang and Slide-Rotational Analysis of the SM3 Hash Function

42. On the Boomerang Uniformity of Cryptographic Sboxes

43. Boomerang Distinguishers for Full HAS-160 Compression Function

44. Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL

45. Boomerang Attacks on Hash Function Using Auxiliary Differentials

46. A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules

47. Boomerang Attacks on BLAKE-32

48. Amélioration du passage à l’échelle et de la réutilisabilité des modèles de cryptanalyse différentielle à l'aide de la programmation par contraintes

49. New Boomerang Attacks on ARIA

50. A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony

Catalog

Books, media, physical & digital resources