搜索结果: 1-10 共查到“correlation attacks”相关记录10条 . 查询时间(0.14 秒)
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Small-state stream cipher Grain Correlation attack
2019/7/15
Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challengin...
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
symmetric cryptography stream cipher correlation attack
2019/3/20
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the met...
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Symmetric-key cryptography tweakable block ciphers zero-correlation
2019/3/1
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, ...
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Power analysis SW-CPA Jittered clocks
2018/4/9
Power analysis side channel attacks rely on aligned traces. As a counter-measure, devices can use a jittered clock to misalign the power traces. In this paper we suggest a way to overcome this counter...
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0
Stream ciphers Cryptanalysis Large-unit
2016/3/23
Several improvements of fast correlation attacks have been proposed during the past two decades, with a regrettable lack of a better generalization and adaptation to the concrete involved primitives, ...
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction
Dimensionality Reduction Higher-Order Correlation
2016/1/5
Multi-variate side-channel attacks allow to break higher-order masking
protections by combining several leakage samples. But how to optimally extract all
the information contained in all possible d-...
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method
block ciphers Feistel like ciphers impossible differential
2016/1/4
While recent publications have shown strong relations between
impossible differential and zero-correlation distinguishers as well as
between zero-correlation and integral distinguishers, we analyze ...
A note on“Improved Fast Correlation Attacks on Stream Ciphers”
Cryptanalysis Stream Cipher Fast Correlation Attack
2010/1/18
In SAC'08, an improved fast correlation attack on stream
ciphers was proposed. This attack is based on the fast correlation attack
proposed at Crypto'00 and combined with the fast Walsh transform.
...
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
Algebraic cryptanalysis multivariate equations overdefined equations
2009/4/14
Many stream ciphers are built of a linear sequence generator
and a non-linear output function f. There is an abundant literature on
(fast) correlation attacks, that use linear approximations of f to...