搜索结果: 1-9 共查到“军队指挥学 truncated differential”相关记录9条 . 查询时间(0.218 秒)
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD
FlexAEAD Distinguisher Iterated Differential
2019/5/23
In this draft, the internal keyed permutation of FlexAEAD has been analysed. In our analysis, we have first reported an iterated truncated differential for one round which holds with a probability of ...
Variants of the AES Key Schedule for Better Truncated Differential Bounds
AES Key schedule Related-key Truncated Differential
2019/2/27
Differential attacks are one of the main ways to attack block ciphers. Hence, we need to evaluate the security of a given block cipher against these attacks. One way to do so is to determine the minim...
Structural Truncated Differential Attacks on round-reduced AES
AES Secret-Key Distinguisher Key-Recovery Attack
2017/9/1
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES has been presented. Although it allows to distinguish a random permutation from an AES like one, it seems (rather) hard to exploit ...
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher
Lightweight Block Cipher RoadRunneR
2016/2/23
RoadRunneR is a small and fast bitslice lightweight block cipher for low cost 8-bit processors proposed by Adnan Baysal and Sa ̈hap S ̧ahin in the LightSec 2015 conference. While most softwa...
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon
Truncated Differential Known-Key Attack Simon
2016/1/27
At Crypto 2015, Blondeau, Peyrin and Wang proposed a
truncated-differential-based known-key attack on full PRESENT, a nibble
oriented lightweight blockcipher with a SPN structure. The truncated
dif...
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
statistical cryptanalysis block cipher chosen plaintext
2016/1/3
The mere number of various apparently different statistical attacks on block ciphers has raised the question about their relationships which would allow to classify them and determine those that give ...
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
decorrelation theory multidimensional linear cryptanalysis truncated differential cryptanalysis
2015/12/31
The decorrelation theory provides a different point of view
on the security of block cipher primitives. Results on some statistical attacks
obtained in this context can support or provide new insigh...
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
multidimensional linear attack zero-correlation linear
2015/12/22
The power of a statistical attack is inversely proportional to
the number of plaintexts necessary to recover information on the encryption
key. By analyzing the distribution of the random variables ...
Truncated differential cryptanalysis of five rounds of Salsa20
Truncated differential cryptanalysis five rounds Salsa20
2009/3/11
We present an attack on Salsa20 reduced to five of its twenty rounds.
This attack uses many clusters of truncated differentials and requires 2165
work and 26 plaintexts.