搜索结果: 1-15 共查到“军队指挥学 impossible differential cryptanalysis”相关记录19条 . 查询时间(0.031 秒)
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
aes differential cryptanalysis tweakable block cipher
2018/11/12
The rapid distribution of lightweight devices raised the demand for efficient encryption and authenticated encryption schemes for small messages. For this purpose, Andreeva et al. recently proposed fo...
Impossible Differential Cryptanalysis on Deoxys-BC-256
authenticated encryption block cipher Deoxys-BC
2018/1/15
Deoxys is a third-round candidate of the CAESAR competition. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block...
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
Cryptanalysis Impossible differential attacks Tweakable
2016/12/7
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle etet alal. in CRYPTO 2016. SKINNY-nn-tt is a block cipher with nn-bit state and tt-bit tweakey (key and tweak). It is desi...
Impossible Differential Cryptanalysis of Midori
light weight block ciphers impossible differential cryptanalysis
2016/6/2
Midori is a light weight block cipher recently presented by Banik et al in ASIACRYPT 2015. There are two versions of Midori with state sizes of 64-bit and 128-bit respectively. The round function is b...
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Impossible differential cryptanalysis key recovery attack
2016/1/23
Impossible differential cryptanalysis has been proved to be one of the most powerful techniques to attack block ciphers. Based on the impossible differential paths, we can usually add several rounds...
Impossible Differential Cryptanalysis of Reduced Round SIMON
SIMON impossible differential bit condition
2015/12/31
Impossible differential is a useful method for cryptanalysis. SIMON is a light weight block cipher that has attracted lots of attention ever since its publication in 2013. In this paper we propose imp...
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
secret-key cryptography
2012/6/14
TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/...
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
secret-key cryptography
2012/3/22
TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/...
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
secret-key cryptography
2012/3/21
TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/...
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Block Cipher Camellia Impossible Differential Cryptanalysis
2012/6/14
As an international standard adopted by ISO/IEC, the block cipher Camellia has been used in various cryptographic applications. In this paper, we reevaluate the security of Camellia against impossible...
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Block Cipher Camellia Impossible Differential Cryptanalysis
2012/3/20
As an international standard adopted by ISO/IEC, the block cipher Camellia has been used in various cryptographic applications. In this paper, we reevaluate the security of Camellia against impossible...
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Block Cipher Camellia Impossible Differential Cryptanalysis
2012/8/28
As an international standard adopted by ISO/IEC, the block cipher Camellia has been used in various cryptographic applications. In this paper, we reevaluate the security of Camellia against impossible...
Impossible Differential Cryptanalysis of SPN Ciphers
secret-key cryptography block ciphers SPN Rijndael ARIA linear transformation impossible differential
2010/7/13
Impossible differential cryptanalysis is a very popular tool for analyzing the security of modern block ciphers and the core of such attack is based on the existence of impossible differentials. Curre...
Unified Impossible Differential Cryptanalysis on Block Cipher Structures
Differential Cryptanalysis Block Cipher Structures
2009/12/29
In this paper, we propose a systematic search method for finding the impossible differential characteristic
for block cipher structures, better than the U-method introduced by Kim et al [6]. This met...
Block ciphers are the very foundation of computer and information
security. FOX, also known as IDEA NXT, is a family
of block ciphers published in 2004 and is famous for its
provable security to cr...