Zobrazeno 1 - 10
of 128
pro vyhledávání: '"rebound attack"'
Autor:
Dongjae Lee, Seokhie Hong
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum collision attacks on hash functions. Their proposal presented a quantum adaptation of the rebound attack and revealed that differential trails, which have too low probabili
Externí odkaz:
https://doaj.org/article/ff54f031fed24988b03b2b9c707638c2
Autor:
Seungjun Baek, Jongsung Kim
Publikováno v:
ETRI Journal, Vol 45, Iss 3, Pp 365-378 (2023)
ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al
Externí odkaz:
https://doaj.org/article/dc92a37e460a4bef8dce0b01f00231ad
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 2 (2021)
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum numb
Externí odkaz:
https://doaj.org/article/00798e06f0814337815596776658f023
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
Limited birthday distinguishers (LBDs) are widely used tools for the cryptanalysis of cryptographic permutations. In this paper we propose LBDs on several variants of the sLiSCP permutation family that are building blocks of two round 2 candidates of
Externí odkaz:
https://doaj.org/article/2eb9ad66d3bf43438e2b5d9df5dbce50
Publikováno v:
IEEE Access, Vol 5, Pp 27857-27867 (2017)
In this paper, we present an eight round distinguisher for four-branch type-2 generalized Feistel network (GFN) with double-SP (DSP) functions and two distinguishers for eight-branch type-2 GFN with single-SP (SSP) functions in a known key attack (KK
Externí odkaz:
https://doaj.org/article/19c6e055970e4d568b3668802c801992
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Autor:
Xiaoyang Dong, Xiaoyun Wang
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 13-32 (2016)
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al.
Externí odkaz:
https://doaj.org/article/e91fa8f22e4a4fea901ffbd4081ac6e2
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Hosoyamada, Akinori, Sasaki, Yu
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020
In this paper we spot light on dedicated quantum collision attacks on concrete hash functions, which has not received much attention so far. In the classical setting, the generic complexity to find collisions of an n-bit hash function is \documentcla