搜索结果: 1-15 共查到“distinguishing”相关记录54条 . 查询时间(0.046 秒)
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Division property cube attacks MILP Trivium
2019/4/16
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, it is shown to be powerful against Trivium-like ciphers. Traditional cube attacks are experimental att...
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Generalized Feistel cipher Simon's algorithm Grover search,
2019/4/1
A generalized Feistel cipher is one of the methods to construct block ciphers, and it has several variants. Dong, Li, and Wang showed quantum distinguishing attacks against the (2d−1)(2d−1...
Distinguishing Error of Nonlinear Invariant Attacks
correlation uniform random function uniform random permutation
2018/11/7
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daeman and Rijmen (2007) had obtained the distributions of the correlations ...
Limitation of the HHSS Obfuscation: Lattice based Distinguishing Attack
Cryptanalysis Indistinguishability Obfuscation Matrix Branching Program
2018/5/3
Indistinguishability Obfuscation (iOiO) is a hopeful tool which obfuscates a program with the least leakage, and produces various applications including functional encryption. Recently, a state-of-the...
Distinguishing cause from effect - Many deficits associated with developmental dyslexia may be a consequence of reduced and suboptimal reading experience
Developmental dyslexia reading illiterate reading experience
2018/3/5
The cause of developmental dyslexia is still unknown despite decades of intense research. Many causal explanations have been proposed, based on the range of impairments displayed by affected individua...
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
secret-key cryptography HIGHT
2018/1/15
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypte...
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
chosen IV attack distinguishing attack statistical attack
2017/11/20
We propose a new attack framework based upon cube testers and d-monomial tests. The d-monomial test is a general framework for comparing the ANF of the symmetric cipher’s output with ANF of a random B...
Distinguishing cause from effect - Many deficits associated with developmental dyslexia may be a consequence of reduced and suboptimal reading experience
developmental dyslexia effect - Many deficits
2017/8/29
The cause of developmental dyslexia is still unknown despite decades of intense research. Many causal explanations have been proposed, based on the range of impairments displayed by affected individua...
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Cryptanalysis Hash function Rebound attacks
2017/6/5
We consider highly structured truncated differential paths to mount rebound attacks on hash functions based on AES-like permutations. We explain how such differential paths can be computed using a Mix...
Distinguishing ecological from evolutionary approaches to transposable elements
transposable elements ecology evolution multivariate analysis philosophy of science
2016/6/14
Considerable variation exists not only in the kinds of transposable elements (TEs) occurring within the genomes of different species, but also in their abundance and distribution. Noting a similarity ...
Distinguishing causality principles
Common Cause Principle Localizability Algebraic quantum field theory
2016/5/31
We distinguish two sub-types of each of the two causality principles formulated in connection with the Common Cause Principle in Henson (2005) and raise and investigate the problem of logical relation...
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
stream cipher Sprout distinguishing attack
2016/1/3
Sprout is a new lightweight stream cipher proposed at FSE 2015. According to its designers, Sprout can resist time-memory-data trade-off (TMDTO) attacks with small internal state size. However, we fin...
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
iterated random permutation blockcipher cascade encryption
2015/12/29
Let P be chosen uniformly from the set P := Perm(S), the set of all permutations over a
set S of size N. In Crypto 2015, Minaud and Seurin proved that for any unbounded time adversary A,
making at m...
Distinguishing a truncated random permutation from a random function
Pseudo random permutations pseudo random functions advantage
2015/12/24
An oracle chooses a function f from the set of n bits strings to itself, which is either a randomly chosen permutation or a randomly chosen function. When queried by an n-bit string w, the oracle comp...
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Data Complexity Distinguisher Distinguishing Attack
2015/12/18
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing
attacks on stream ciphers and analyze their inter-relationships. In the process, we formal...