搜索结果: 1-10 共查到“军事学 ACORN”相关记录10条 . 查询时间(0.137 秒)
Assuring security of the Internet of Things (IoT) is much more challenging than assuring security of centralized environments, like the cloud. A reason for this is that IoT devices are often deployed ...
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, s...
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM for several use-cases, including lightweight applications. ACORN and Ascon are the tw...
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
chosen IV attack distinguishing attack statistical attack
2017/11/20
We propose a new attack framework based upon cube testers and d-monomial tests. The d-monomial test is a general framework for comparing the ANF of the symmetric cipher’s output with ANF of a random B...
Fault attack is one of the most efficient side channel attacks and has attracted much attention in recent public cryptographic literatures. In this work we introduce a fault attack on the authenticate...
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Differential Fault Attack Stream Cipher Grain v1
2017/7/14
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In th...
Some results on ACORN
CAESAR ACORN linear approximation
2016/12/12
In this paper we obtain a weakness in the design specification of ACORN, which is a competitor of CAESAR competition. We show that there exists a probabilistic linear relation between message bits and...
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
CAESAR Authenticated Encryption Cube Attack
2016/12/12
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced rou...
SAT-based cryptanalysis of ACORN
SAT-based cryptanalysis CAESAR competition Authenticated encryption
2016/5/30
The CAESAR competition aims to provide a portfolio of authenticated encryption algorithms.
SAT solvers represent powerful tools to verify automatically and efficiently (among others) the
confidentia...
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
CAESAR Authenticated encryption AEAD
2015/12/23
This paper analyzes the authenticated encryption algorithm
ACORN, a candidate in the CAESAR cryptographic competition. We
identify weaknesses in the state update function of ACORN which result
in c...