We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 152 results
  1. Yoyo attack on 4-round Lai-Massey scheme with secret round functions

    In this study, we present the first yoyo attack to recover the secret round function of the 4-round Lai-Massey scheme with an affine orthomorphism....

    Le Dong, Danxun Zhang, ... Wenling Wu in Designs, Codes and Cryptography
    Article 03 May 2024
  2. Structural evaluation of AES-like ciphers against mixture differential cryptanalysis

    At ASIACRYPT 2017, Rønjom et al. analyzed AES with the yoyo attack. Similar to their 4-round AES distinguisher, Grassi proposed the 4-round mixture...

    **aofeng **e, Tian Tian in Designs, Codes and Cryptography
    Article 05 August 2023
  3. Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls

    Virtually all modern blockciphers are iterated. In this paper, we ask: to construct a secure iterated blockcipher “non-trivially”, how many calls to...
    Chun Guo, Lei Wang, Dongdai Lin in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  4. Zero-Shot Action Recognition with ChatGPT-Based Instruction

    As deep learning continues to evolve, datasets are becoming increasingly larger, leading to higher costs for manual labeling. Zero-shot learning...
    Nan Wu, Hiroshi Kera, Kazuhiko Kawamoto in Advanced Computational Intelligence and Intelligent Informatics
    Conference paper 2024
  5. Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security

    In this paper we propose a new family of highly efficient and quantum secure AES-based block cipher dubbed Ghidle, which supports a key size of 256...
    Motoki Nakahashi, Rentaro Shiba, ... Takanori Isobe in Information Security and Privacy
    Conference paper 2023
  6. Drawing Shapes

    GameMaker is very flexible when it comes to drawing. There are several built-in functions for drawing basic and advanced geometric shapes. Drawing is...
    Ben Tyers in GameMaker Fundamentals
    Chapter 2023
  7. Unsupervised open-world human action recognition

    Open-world recognition (OWR) is an important field of research that strives to develop machine learning models capable of identifying and learning...

    Matheus Gutoski, André Eugenio Lazzaretti, Heitor Silvério Lopes in Pattern Analysis and Applications
    Article 26 September 2023
  8. Sequences

    Sequences allow you to program in a set sequence that can be applied to one or more assets. It can play sounds, move objects, and move and animate...
    Ben Tyers in GameMaker Fundamentals
    Chapter 2023
  9. Workshop#3 POS Tagging Using NLTK (Hour 5–6)

    In Chap. 3 , we studied basic concepts and theories related to Part-of-Speech (POS) and various POS tagging...
    Raymond S. T. Lee in Natural Language Processing
    Chapter 2024
  10. Pholkos – Efficient Large-State Tweakable Block Ciphers from the AES Round Function

    This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state and key sizes of...
    Jannis Bossert, Eik List, ... Sebastian Schmitz in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  11. Cryptanalysis of FlexAEAD

    This paper analyzes the internal keyed permutation of FlexAEAD which is a round-1 candidate of the NIST LightWeight Cryptography Competition. In our...
    Mostafizar Rahman, Dhiman Saha, Goutam Paul in Progress in Cryptology - AFRICACRYPT 2020
    Conference paper 2020
  12. Construction of Torus of Revolution Generated from Epicycloids

    Among the geometric bodies of revolution, the torus of revolution stands out, which can be generated from a circumference, lemniscate curves and the...
    Daniel A. Flores-Cordova, Carlos E. Arellano- Ramírez, ... Ricardo Velezmoro-León in Computational Science and Its Applications – ICCSA 2023
    Conference paper 2023
  13. The Retracing Boomerang Attack

    Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and...
    Orr Dunkelman, Nathan Keller, ... Adi Shamir in Advances in Cryptology – EUROCRYPT 2020
    Conference paper 2020
  14. Improved Truncated Differential Distinguishers of AES with Concrete S-Box

    The security of Advanced Encryption Standard (AES) is one of the most important issues in cryptanalysis. In ToSC 2020, Bao et al. proposed an open...
    Chengcheng Chang, Meiqin Wang, ... Wei Wang in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
  15. Enhancing Zero-Shot Action Recognition in Videos by Combining GANs with Text and Images

    Zero-shot action recognition (ZSAR) tackles the problem of recognising actions that have not been seen by the model during the training phase....

    Kaiqiang Huang, Luis Miralles-Pechuán, Susan Mckeever in SN Computer Science
    Article Open access 05 May 2023
  16. A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis

    Advanced Encryption Standard (AES) is a well-known, extensively used, broadly studied, and industry-standard symmetric key-based block cipher. Hence...

    Debranjan Pal, Md Rasid Ali, ... Dipanwita Roy Chowdhury in The Journal of Supercomputing
    Article 02 November 2022
  17. Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128

    SPARX is a family of ARX-based block ciphers introduced at ASIACRYPT 2016, which is designed according to the long-trail strategy (LTS). For...
    Zhichao Xu, Hong Xu, ... Wenfeng Qi in Information Security and Cryptology
    Conference paper 2024
  18. Target re-location kernel correlation filtered visual tracking with fused deep feature

    To enhance the tracking robustness of the kernel correlation filtering algorithm in complex scenarios, the present study combines the traditional...

    Qingzhong Shu, Huicheng Lai, ... Liejun Wang in Multimedia Tools and Applications
    Article 25 February 2022
  19. Truncated Boomerang Attacks and Application to AES-Based Ciphers

    The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been...
    Augustin Bariant, Gaëtan Leurent in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  20. Yoyo Tricks with AES

    In this paper we present new fundamental properties of SPNs. These properties turn out to be particularly useful in the adaptive chosen...
    Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth in Advances in Cryptology – ASIACRYPT 2017
    Conference paper 2017
Did you find what you were looking for? Share feedback.