搜索结果: 136-150 共查到“军事学 AES”相关记录200条 . 查询时间(0.203 秒)
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Cold-boot attacks decayed memory SAT solvers
2010/7/13
Cold boot attack is a side channel attack which exploits the data remanence property of random access memory (RAM) to retrieve its contents which remain readable shortly after its power has been remov...
Improved Single-Key Attacks on 8-round AES
secret-key cryptography AES cryptanalysis single-key attacks multiset tabulation differential enumeration key bridging
2010/7/13
AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks were recently found against two o...
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
Low Voltage Fault Attacks AES RSA General Purpose Processors
2010/3/16
Fault injection attacks have proven in recent times
a powerful tool to exploit implementative weaknesses of robust
cryptographic algorithms. A number of different techniques
aimed at disturbing the...
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Driven Cache Attack AES CLEFIA
2010/2/20
This paper presents an improved Cache trace attack on AES and CLEFIA by considering Cache miss trace information and S-box misalignment. In 2006, O. Acıiçmez et al. present a trace driven ...
The Effects of the Omission of Last Round’s MixColumns on AES
Omission Last Round’s MixColumns AES
2010/2/1
The Advanced Encryption Standard (AES) is themost widely
deployed block cipher. It follows the modern iterated block cipher approach,
iterating a simple round function multiple times. The last round...
An Information Theoretic Perspective on the Differential Fault Analysis against AES
Differential Fault Analysis AES Information theory
2010/2/1
Differential Fault Analysis (DFA) against AES has been actively studied
these years. Based on similar assumptions of the fault injection, different DFA attacks
against AES have been proposed. Howeve...
Differential Fault Analysis on AES with 192 and 256-Bit Keys
Differential Fault Analysis AES 192 and 256-Bit Keys
2010/1/18
This paper describes a differential fault analysis (DFA)
on AES with 192 and 256-bit keys. We show a new attack
in which both 192 and 256-bit keys are retrieved within a
feasible computational time...
We propose several variants of a secure multiparty computation protocol for AES encryp-
tion. The best variant requires 2200+ 400
255 expected elementary operations in expected 70+ 20
255 rounds
t...
Super-Sbox Cryptanalysis:Improved Attacks for AES-like permutations
hash function cryptanalysis AES
2009/11/18
In this paper, we improve the recent rebound and start-from-the-middle
attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that
one can view two rounds of such permutatio...
This paper presents new software speed records for encryp-
tion and decryption using the block cipher AES-128 for dierent ar-
chitectures. Target platforms are 8-bit AVR microcontrollers, NVIDIA
g...
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
Key Recovery Attacks Practical Complexity AES Variants
2009/8/7
AES is the best known and most widely used block cipher. Its three versions (AES-
128, AES-192, and AES-256) dier in their key sizes (128 bits, 192 bits and 256 bits) and in their
number of rounds ...
基于AES算法的Cache Hit旁路攻击
旁路攻击 Cache 命中 AES算法
2009/7/31
AES加密快速实现中利用了查表操作,查表的索引值会影响Cache命中率和加密时间,而查表的索引值和密钥存在密切关系。通过分析AES最后一轮加密过程中查表索引值与密文和最后一轮子密钥的关系,以及它们对Cache命中与否和加密时间长短的影响,提出一种利用Cache hit信息作为旁路信息对AES进行旁路攻击的技术,在Intel Celeron 1.99 GHz和Pentium4 3.6 GHz CPU...
采用指令集扩展和随机调度的AES算法实现技术
高级加密标准 随机掩码 指令集扩展
2009/7/23
在随机掩码技术基础上,定义了若干细粒度的随机掩码操作,将AES(Advanced Encryption Standard)算法中各种变换分解为细粒度随机掩码操作的序列,并使得所有的中间结果均被不同的随机量所掩码。为高效实现基于细粒度随机掩码操作分解的AES算法,定义了三种扩展指令,结合指令随机调度方法,给出了AES算法的完整实现流程,并指出这种实现技术可以抗一阶和高阶功耗攻击。实验结果表明,与其他...
Related-key Cryptanalysis of the Full AES-192 and AES-256
Related-key Cryptanalysis Full AES-192 AES-256
2009/7/14
In this paper we present two related-key attacks on the full
AES. For AES-256 we show the first key recovery attack that works
for all the keys and has complexity 2119, while the recent attack by
B...
Examples of differential multicollisions for 13 and 14 rounds of AES-256
differential multicollisions AES-256 active S-box
2009/6/15
Here we present practical differential q-multicollisions for AES-256. In our
paper [1] q-multicollisions are found with complexity q 267. We relax conditions
on the plaintext difference P allowing ...