搜索结果: 1-15 共查到“军队指挥学 differential attack”相关记录16条 . 查询时间(0.814 秒)
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
related-tweakey impossible dierential attack tweakable block cipher Deoxys-BC-256
2018/7/17
Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we s...
MILP-based Differential Attack on Round-reduced GIFT
GIFT Differential Cryptanalysis Lightweight Block Cipher
2018/5/2
At Asiacrypt 2014, Sun et al. proposed a MILP model to search differential trails for bit-oriented block ciphers. In this paper, we improve this model to search differential characteristics of GIFT, a...
Impossible Differential Attack on QARMA Family of Block Ciphers
impossible differential attack truncated differential QARMA
2018/4/12
QARMA is a family of lightweight tweakable block ciphers, which is used to support a software protection feature in the ARMv8 architecture. In this paper, we study the security of QARMA family against...
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
Tweakable block cipher Impossible differential attack Related-Tweakey
2018/2/9
In this paper, we study the relation of single-key impossible differentials with the related-tweakey/key ones and propose an interesting algorithm that can efficiently derive longer related-tweakey/ke...
Impossible Differential Attack on Midori128 Using Rebound-like Technique
cryptanalysis lightweight block cipher impossible differential
2017/4/5
Midori is a family of lightweight block cipher proposed by Banik et al. in ASIACRYPT 2015 and it is optimized with respect to the energy consumed by the circuit per bit in encryption or decryption ope...
Impossible Differential Attack on Simpira v2
Simpira-4 impossible differential attack Super S-box
2016/12/29
Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016 which can be used to construct high throughput block ciphers using the Even-Mansour construction, permutation-based hash...
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Symmetric cryptography cryptanalysis tweakable block cipher
2016/12/7
At CRYPTO'16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with SIMON. SKINNY can be implemented efficiently in both soft- and hardware, possess...
Related-Key Differential Attack on Round Reduced RECTANGLE-80
RECTANGLE block cipher Mixed-integer linear programming Related-key differential attack
2016/1/5
RECTANGLE is a newly proposed lightweight block cipher which allows fast implementations for multiple platforms by using bit-slice techniques. It is an iterative 25-round SPN block cipher with a 64-bi...
New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
SAFER\scriptsize +\normalsize SAFER\scriptsize ++\normalsize
2013/2/21
SAFER\scriptsize + \normalsize was a candidate block cipher for AES with 128-bit block size and a variable key sizes of 128, 192 or 256 bits. Bluetooth uses customized versions of SAFER\scriptsize + \...
Security of Reduced-Round Camellia against Impossible Differential Attack
Camellia Block Cipher Impossible Differential Cryptanalysis
2012/3/26
Camellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. By using some interesting properties of $FL/FL^{-1}$ functions, we introduce new 7-ro...
Higher-Order Differential Attack on Reduced SHA-256
hash functions higher-order differentials non-randomness boomerang attack SHA-256
2011/2/23
In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 st...
Higher-Order Differential Attack on Reduced SHA-256
hash functions higher-order differentials non-randomness boomerang attack SHA-256
2012/3/30
In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 st...
Differential Attack on Five Rounds of the SC2000 Block Cipher
Block cipher SC2000 Differential cryptanalysis
2010/11/26
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128-bit user key is used. It is a CRYPTREC recommended e-government ci...
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
Cryptanalysis Improbable differential attack CLEFIA
2010/8/17
In this paper we present a new statistical cryptanalytic technique that we call improbable differential cryptanalysis which uses a differential that is less probable when the correct key is used. We p...
Breaking the Symmetry: a Way to Resist the New Differential Attack
multivariate public key cryptography Matsumoto-Imai differential symmetry projection fixing
2008/5/28
sflash had recently been broken by Dubois, Stern, Shamir,
etc., using a differential attack on the public key. The C¤− signature
schemes are hence no longer practical.