搜索结果: 1-4 共查到“Boomerang attack”相关记录4条 . 查询时间(0.078 秒)
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash
function family issued by the National Institute of Standards and Technology
(NIST) in 2002 and is widely used all over the world. In this work,...
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
Differential Cryptanalysis Related-Key Boomerang Attack
2014/3/6
The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers.
In th...
Related-Key Boomerang Attack on Block Cipher SQUARE
Square Related-key boomerang attack block cipher
2010/2/20
Square is 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design building blocks of Rijndael. Key schedule of Square is simple and efficient b...
Impossible Boomerang Attack for Block Cipher Structures
Block Ciphers Impossible Boomerang Attack Impossible Boomerang Distinguishers
2009/10/9
Impossible boomerang attack [5] (IBA) is a new variant of dierential cryptanalysis
against block ciphers. Evident from its name, it combines the ideas of both impossible dierential cryptanalysis an...