Search
Search Results
-
Yoyo attack on 4-round Lai-Massey scheme with secret round functions
In this study, we present the first yoyo attack to recover the secret round function of the 4-round Lai-Massey scheme with an affine orthomorphism....
-
Structural evaluation of AES-like ciphers against mixture differential cryptanalysis
At ASIACRYPT 2017, Rønjom et al. analyzed AES with the yoyo attack. Similar to their 4-round AES distinguisher, Grassi proposed the 4-round mixture...
-
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls
Virtually all modern blockciphers are iterated. In this paper, we ask: to construct a secure iterated blockcipher “non-trivially”, how many calls to... -
Zero-Shot Action Recognition with ChatGPT-Based Instruction
As deep learning continues to evolve, datasets are becoming increasingly larger, leading to higher costs for manual labeling. Zero-shot learning... -
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security
In this paper we propose a new family of highly efficient and quantum secure AES-based block cipher dubbed Ghidle, which supports a key size of 256... -
Drawing Shapes
GameMaker is very flexible when it comes to drawing. There are several built-in functions for drawing basic and advanced geometric shapes. Drawing is... -
Unsupervised open-world human action recognition
Open-world recognition (OWR) is an important field of research that strives to develop machine learning models capable of identifying and learning...
-
Sequences
Sequences allow you to program in a set sequence that can be applied to one or more assets. It can play sounds, move objects, and move and animate... -
Workshop#3 POS Tagging Using NLTK (Hour 5–6)
In Chap. 3 , we studied basic concepts and theories related to Part-of-Speech (POS) and various POS tagging... -
Pholkos – Efficient Large-State Tweakable Block Ciphers from the AES Round Function
This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state and key sizes of... -
Cryptanalysis of FlexAEAD
This paper analyzes the internal keyed permutation of FlexAEAD which is a round-1 candidate of the NIST LightWeight Cryptography Competition. In our... -
Construction of Torus of Revolution Generated from Epicycloids
Among the geometric bodies of revolution, the torus of revolution stands out, which can be generated from a circumference, lemniscate curves and the... -
The Retracing Boomerang Attack
Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and... -
Improved Truncated Differential Distinguishers of AES with Concrete S-Box
The security of Advanced Encryption Standard (AES) is one of the most important issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open... -
Enhancing Zero-Shot Action Recognition in Videos by Combining GANs with Text and Images
Zero-shot action recognition (ZSAR) tackles the problem of recognising actions that have not been seen by the model during the training phase....
-
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis
Advanced Encryption Standard (AES) is a well-known, extensively used, broadly studied, and industry-standard symmetric key-based block cipher. Hence...
-
Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128
SPARX is a family of ARX-based block ciphers introduced at ASIACRYPT 2016, which is designed according to the long-trail strategy (LTS). For... -
Target re-location kernel correlation filtered visual tracking with fused deep feature
To enhance the tracking robustness of the kernel correlation filtering algorithm in complex scenarios, the present study combines the traditional...
-
Truncated Boomerang Attacks and Application to AES-Based Ciphers
The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been... -
Yoyo Tricks with AES
In this paper we present new fundamental properties of SPNs. These properties turn out to be particularly useful in the adaptive chosen...