搜索结果: 1-7 共查到“军事学 boomerang attacks”相关记录7条 . 查询时间(0.062 秒)
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Boomerang connectivity table GIFT Automatic search
2019/6/10
In Eurocrypt 2018, Cid et al. proposed a novel notion called the boomerang connectivity table, which formalised the switch property in the middle round of boomerang distinguishers in a unified approac...
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against
the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2,
and compare their c...
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
hash function BLAKE SM3 boomerang attack
2014/3/5
In this paper we study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Offi...
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
Related-key attacks differential cryptanalysis boomerang attacks AES key schedule
2011/2/23
In this paper, we summarize the recent related-key differential and boomerang attacks on AES by Biryukov et al. and present a framework for protection against these attacks. Then we study an alternati...
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
secret-key cryptography / Related-key attacks differential cryptanalysis boomerang attacks AES key schedule
2012/3/29
In this paper, we summarize the recent related-key differential and boomerang attacks on AES by Biryukov et al. and present a framework for protection against these attacks. Then we study an alternati...
Improved Related-key Boomerang Attacks on Round-Reduced Threefish-512
Threefish-512 related-key boomerang attack modular differential
2009/11/18
Hash function Skein is one of the 14 NIST SHA-3 second
round candidates. Threefish is a tweakable block cipher as the core of
Skein, defined with a 256-, 512-, and 1024-bit block size. The 512-bit
...
New Related-Key Boomerang Attacks on AES(Full Version)
block ciphers AES differential cryptanalysis
2009/6/9
In this paper we present two new attacks on round reduced
versions of the AES. We present the first application of the related-key
boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack
...