搜索结果: 16-30 共查到“军事学 differential”相关记录263条 . 查询时间(0.107 秒)
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Kuznyechik LSX MDS codes
2018/11/12
his paper presents the complete description of the best differentials and linear hulls in 2-round Kuznyechik. We proved that 2-round MEDP=2−86.66...MEDP=2−86.66..., MELP=2−76.739...M...
Differential Cryptanalysis in ARX Ciphers, Applications to LEA
Differential characteristics Nested Monte-Carlo Search ARX ciphers
2018/11/9
In this paper we focus on differential cryptanalysis dedicated to a particular class of cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the Nested Monte-Carlo Sear...
Differential cryptanalysis in ARX ciphers, Application to SPECK
Differential path Nested Monte-Carlo Search ARX ciphers
2018/11/9
In this paper, we propose a new algorithm inspired by Nested to find a differential path in ARX ciphers. In order to enhance the decision process of our algorithm and to reduce the search space of our...
MILP-Based Automatic Differential Searches for LEA and HIGHT
MILP model Differential Attack ARX ciphers
2018/11/7
In this paper we use MILP technique for automatic search for differential characteristics of ARX ciphers LEA and HIGHT. We show that the MILP model of the differential property of modular addition wit...
Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$
APN function Differential Uniformity Nyberg's bound
2018/11/2
Little theoretical work has been done on (n,m)(n,m)-functions when n2nn2en though these functions can be used in Feistel ciphers, and actually play an important role in several block cipher...
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES
AES Key-Dependent Integral
2018/8/10
Reduced-round AES has been a popular underlying primitive to design new cryptographic schemes and thus its security including distinguishing properties deserves more attention. At Crypto'16, a key-dep...
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Symmetric-key cryptography differential cryptanalysis lightweight cryptography
2018/7/19
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
related-tweakey impossible dierential attack tweakable block cipher Deoxys-BC-256
2018/7/17
Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we s...
Differential Power Analysis of XMSS and SPHINCS
Post-quantum cryptography Hash-based signatures DPA
2018/7/16
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
In this work, we discuss two notions of differential equivalence on Sboxes. First, we introduce the notion of DDT-equivalence which applies to vectorial Boolean functions that share the same differenc...
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
We present various differential fault attack schemes for the RECTANGLE-80 and demonstrate how initially we started from a 80-bit fault to a single word fault scheme. This was mainly due to a different...
MILP-based Differential Attack on Round-reduced GIFT
GIFT Differential Cryptanalysis Lightweight Block Cipher
2018/5/2
At Asiacrypt 2014, Sun et al. proposed a MILP model to search differential trails for bit-oriented block ciphers. In this paper, we improve this model to search differential characteristics of GIFT, a...
Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters
s-box substitution involutory substitution
2018/4/25
S-boxes are important parts of modern ciphers. To construct S-boxes having cryptographic parameters close to optimal is an unsolved problem at present time. In this paper some new methods for generati...
Differential Fault Attacks on Deterministic Lattice Signatures
differential fault attacks post-quantum cryptography lattice-based cryptography
2018/4/19
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnera...