搜索结果: 31-45 共查到“军事学 differential”相关记录263条 . 查询时间(0.424 秒)
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
Impossible Differential Attack on QARMA Family of Block Ciphers
impossible differential attack truncated differential QARMA
2018/4/12
QARMA is a family of lightweight tweakable block ciphers, which is used to support a software protection feature in the ARMv8 architecture. In this paper, we study the security of QARMA family against...
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Symmetric-key cryptography cryptanalysis boomerang truncated differential
2018/4/11
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16. Similar to the wide-trail strategy, the LTS a...
Approximate and Probabilistic Differential Privacy Definitions
differential privacy foundations
2018/3/23
This technical report discusses three subtleties related to the widely used notion of differential privacy (DP). First, we discuss how the choice of a distinguisher influences the privacy notion and w...
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC
Tweakable block cipher Impossible differential attack Related-Tweakey
2018/2/9
In this paper, we study the relation of single-key impossible differentials with the related-tweakey/key ones and propose an interesting algorithm that can efficiently derive longer related-tweakey/ke...
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
fault attacks block ciphers protection
2018/1/27
In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called ``Tweak-in-Plaintext'', ensures that an uncontrolled ...
Impossible Differential Cryptanalysis on Deoxys-BC-256
authenticated encryption block cipher Deoxys-BC
2018/1/15
Deoxys is a third-round candidate of the CAESAR competition. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block...
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Generalized Feistel Network Differential Analysis Chosen Ciphertext Attack
2017/12/19
Nachef et al used differential cryptanalysis to study four types of Generalized Feistel Scheme (GFS). They gave the lower bound of maximum number of rounds that is indistinguishable from a random perm...
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers
side-channel analysis differential plaintext attack
2017/12/1
Bit permutations are a common choice for diffusion function in lightweight block ciphers, owing to their low implementation footprint. In this paper, we present a novel Side-Channel Assisted Different...
Risky Traitor Tracing and New Differential Privacy Negative Results
Traitor Tracing Differential Privacy
2017/11/27
Finally, we can capture impossibility results for differential privacy from risky traitor tracing. Since our ciphertexts are short (O(λ)O(λ)), thus we get the negative result which matches what one wo...
Differential Attacks on LILLIPUT Cipher
Differential cryptanalysis Improbable differential cryptanalysis Automated research of attacks
2017/11/27
In SAC 2013, Berger et al. defined Extended Generalized Feistel Networks (EGFN) and analyzed their security. Later, they proposed a cipher based on this structure: LILLIPUT. Impossible differential at...
Hardness of Non-Interactive Differential Privacy from One-Way Functions
differential privacy one-way functions traitor tracing
2017/11/21
A central challenge in differential privacy is to design computationally efficient noninteractive algorithms that can answer large numbers of statistical queries on a sensitive dataset. That is, we wo...
Privacy Buckets: A numeric method for k-fold tight differential privacy
differential privacy foundations,composition
2017/10/30
The robustness of (approximate) differential privacy (DP) guarantees in the presence of thousands and even hundreds of thousands observations is crucial for many realistic application scenarios, such ...
Differential Cryptanalysis of 18-Round PRIDE
Block cipher PRIDE Differential cryptanalysis
2017/10/25
Bounds on the Differential Branch Number of Permutations
Permutation S-box differential branch number
2017/10/12
Nonlinear permutations (S-boxes) are key components in block ciphers. Differential branch number measures the diffusion power of a permutation. Differential branch number of nonlinear permutations of ...