搜索结果: 136-150 共查到“军事学 Cryptanalysis”相关记录515条 . 查询时间(0.577 秒)
Standard differential cryptanalysis uses statistical dependencies
between the difference of two plaintexts and the difference of the respective
two ciphertexts to attack a cipher. Here we introduce ...
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
Cryptography Block cipher Degradation property Zero- correlation linear cryptanalysis
2016/1/27
This paper investigates the degradation properties of Boolean functions from the aspects of the distributions of dierences and linear masks, and shows two characterizations of the degraded Boolean fu...
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
linear cryptanalysis authenticated encryption automated tools
2016/1/27
Differential and linear cryptanalysis are the general purpose
tools to analyze various cryptographic primitives. Both techniques have
in common that they rely on the existence of good differential o...
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Weighted LLL reduction Public-key cryrtosystem Post-quantum cryptosystem
2016/1/26
In this paper, we give an attack against a public key cryptosystem based on Diophantine
equations of degree increasing type (DEC) proposed by the third author ([Oku15]). We show
that the security of...
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Side-channel distinguisher Confusion coefficient Kolmogorov- Smirnov analysis
2016/1/26
In this paper, we carry out a detailed mathematical study of
two theoretical distinguishers based on the Kolmogorov-Smirnov (KS)
distance. This includes a proof of soundness and the derivation of cl...
Cryptanalysis via algebraic spans
noncommutative algebraic cryptography group theory-based cryptography braid-based cryptography
2016/1/26
We describe a new method for obtaining polynomial time solutions of problems
in noncommutative algebraic cryptography. This method is easier to apply and more efficient
than the linear centralizer m...
A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem
General approximate common divisors problems Fully homomorphic encryption Lattice
2016/1/26
In this paper, we propose a new algorithm for solving the general approximate common divisors (GACD) problems, which is based on lattice reduction algorithms on certain special lattices and linear equ...
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
CLEFIA cryptanalysis weak keys
2016/1/26
So far, low probability differentials for the key schedule of block ciphers have been used as a straightforward proof of security against related-key differential attacks. To achieve the resistance, i...
FIDES is a lightweight authenticated cipher, presented at CHES 2013. The cipher has two version, providing either 80-bit or 96-bit security. In this paper, we describe internal state-recovery attacks ...
Cryptanalysis on “Secure untraceable off-line electronic cash system”
digital signatures discrete logarithm problem cryptanalysis
2016/1/26
Recently, Baseri et al. proposed a secure untraceable off-line electronic cash
system. They claimed that their scheme could achieve security requirements of an
e-cash system such as, untraceability,...
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
Differential cryptanalysis PRINCE multiple differentials
2016/1/26
PRINCE is a lightweight block cipher proposed by Borghoff
et al. at Asiacrypt 2012. Due to its originality, novel design and low number
of rounds, it has already attracted the attention of a large n...
Cryptanalysis of KLEIN (Full version)
KLEIN lightweight block cipher truncated differential cryptanalysis
2016/1/26
Due to the recent emergence of resource-constrained devices, cryptographers are
facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting
primitives, proposed at R...
In 2013, Borghoff et al. introduced a slender-set linear cryptanalysis
on PRESENT-like ciphers with key-dependent secret S-boxes. In
this paper, we propose an improved slender-set linear attack to P...
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
Authentication Protocols Smart Cards DoS
2016/1/25
In this work we consider two protocols for performing cryptanalysis
and security enhancement. The first one by Jiang et al., is a
password-based authentication scheme1 which does not use smart cards...
Structural Cryptanalysis of McEliece Schemes with Compact Keys
public-key cryptography McEliece cryptosystem algebraic cryptanalysis
2016/1/25
A very popular trend in code-based cryptography is to decrease the public-key size by
focusing on subclasses of alternant/Goppa codes which admit a very compact public matrix, typically
quasi-cyclic...