搜索结果: 136-150 共查到“军事学 differential”相关记录263条 . 查询时间(0.201 秒)
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
SHA-1 BLAKE BLAKE2
2015/12/30
At CRYPTO 2012, Knellwolf and Khovratovich presented a differential
formulation of advanced meet-in-the-middle techniques for preimage attacks on hash
functions. They demonstrated the usefulness of ...
Combining Differential Privacy and Secure Multiparty Computation
secret sharing differential privacy private statistics
2015/12/29
We consider how to perform privacy-preserving analyses on
private data from different data providers and containing personal information
of many different individuals. We combine differential privac...
Differential Privacy in distribution and instance-based noise mechanisms
Anonymity Information hiding
2015/12/25
In this paper, we introduce the notion of (, δ)-differential privacy in distribution,
a strong version of the existing (, δ)-differential privacy, used to mathematically ensure
that private data o...
Differential Computation Analysis: Hiding your White-Box Designs is Not Enough
White-Box Designs Differential Computation Analysis
2015/12/24
Although all current scientific white-box approaches of standardized cryptographic
primitives are broken, there is still a large number of companies which sell 搒ecure?white-box
products. In this pap...
Related-key Impossible Differential Analysis of Full Khudra
Lightweight Block Cipher Khudra
2015/12/23
Khudra is a 18-round lightweight block cipher proposed by
Souvik Kolay and Debdeep Mukhopadhyay in the SPACE 2014 conference
which is applicable to Field Programmable Gate Arrays (FPGAs).
In this p...
The Simeck family of lightweight block ciphers was proposed
in CHES 2015 which combines the good design components from NSA
designed ciphers SIMON and SPECK. Dynamic key-guessing techniques
were pr...
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
multidimensional linear attack zero-correlation linear
2015/12/22
The power of a statistical attack is inversely proportional to
the number of plaintexts necessary to recover information on the encryption
key. By analyzing the distribution of the random variables ...
Differential and Linear Cryptanalysis of ARX with Partitioning -- Application to FEAL and Chaskey
Differential cryptanalysis linear cryptanalysis ARX
2015/12/22
In this work, we refine a partitioning technique recently
proposed by Biham and Carmeli to improve the linear cryptanalysis
of addition operations, and we propose an analogue improvement of
differe...
The Complexity of Computing the Optimal Composition of Differential Privacy
differential privacy composition computational complexity
2015/12/21
In the study of differential privacy, composition theorems (starting with the original
paper of Dwork, McSherry, Nissim, and Smith (TCC’06)) bound the degradation of privacy
when composing several d...
Differential Indistinguishability for Cryptography with (Bounded) Weak Sources
Differential Privacy Indistinguishability Randomness Weak Sources Santha-Vazirani Sources
2014/3/5
Indistinguishability-based definitions of cryptographic primitives such as encryption, commitments, and zero-knowledge proofs are proven to be impossible to realize in scenarios where parties have acc...
Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128
impossible differential cryptanalysis linear approximation
2014/3/12
CLEFIA is a 128-bit block cipher proposed by Sony Corporation in 2007. Our paper introduces a new chosen text attack, the impossible differential-linear attack, on iterated cryptosystems. The attack i...
Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
tools for cryptanalysis automatic search
2014/3/5
We propose a tool for automatic search for differential trails in ARX ciphers. By introducing the concept of a partial difference distribution table (pDDT) we extend Matsui's algorithm, originally pro...
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
block cipher differential cryptanalysis
2014/3/5
Zorro is an AES-like lightweight block cipher proposed in CHES 2013, which only uses 4 S-boxes per round. The designers showed the resistance of the cipher against various attacks and concluded the ci...
Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
Evaluation Tool SAT solver
2014/3/12
An increasing number of cryptographic primitives are built using the ARX operations: addition modulo $2^n$, bit rotation and XOR. Because of their very fast performance in software, ARX ciphers are be...
The Resistance of PRESENT-80 Against Related-Key Differential Attacks
secret-key cryptography
2014/3/10
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that no related-key differential charact...