搜索结果: 1-7 共查到“密码学 Distinguishing attack”相关记录7条 . 查询时间(0.07 秒)
Limitation of the HHSS Obfuscation: Lattice based Distinguishing Attack
Cryptanalysis Indistinguishability Obfuscation Matrix Branching Program
2018/5/3
Indistinguishability Obfuscation (iOiO) is a hopeful tool which obfuscates a program with the least leakage, and produces various applications including functional encryption. Recently, a state-of-the...
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
secret-key cryptography HIGHT
2018/1/15
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypte...
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Cryptanalysis Hash function Rebound attacks
2017/6/5
We consider highly structured truncated differential paths to mount rebound attacks on hash functions based on AES-like permutations. We explain how such differential paths can be computed using a Mix...
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
stream cipher Sprout distinguishing attack
2016/1/3
Sprout is a new lightweight stream cipher proposed at FSE 2015. According to its designers, Sprout can resist time-memory-data trade-off (TMDTO) attacks with small internal state size. However, we fin...
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
Skein Differential analysis Related key Boomerang attack
2012/3/27
On Nov 2007, NIST announced the SHA-3 competition to select a new hash standard as a replacement of SHA-2. On Dec 2010, five submissions have been selected as the final round candidates, including Ske...
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
CBC MAC Distinguishing attack
2009/6/11
In this paper, we first present a new distinguisher on the
CBC-MAC based on a block cipher in Cipher Block Chaining (CBC)
mode. It can also be used to distinguish other CBC-like MACs from
random fu...
The output of RC4 was analyzed using the ”book stack” test for randomness
from [7]. It is experimentally shown that the keystream generated from RC4
can be distinguished from random with about 232 o...