搜索结果: 46-60 共查到“军事学 AES”相关记录200条 . 查询时间(0.134 秒)
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption scheme currently considered for standardization by the Crypto Forum Research Group (CFRG). First, we p...
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY
Bit-serial implementations bit-slide lightweight cryptography
2017/6/26
Area minimization is one of the main efficiency criterion for lightweight encryption primitives. While reducing the implementation data path is a natural strategy for achieving this goal, Substitution...
Analysing Relations involving small number of Monomials in AES S- Box
AES Algebraic Attack S-Box
2017/6/22
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES. Many different ...
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Cryptanalysis Hash function Rebound attacks
2017/6/5
We consider highly structured truncated differential paths to mount rebound attacks on hash functions based on AES-like permutations. We explain how such differential paths can be computed using a Mix...
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
multi-party computation block cipher implementation
2017/5/2
We present an actively secure protocol for secure multi-party computation based on lookup tables, by extending the recent, two-party `TinyTable' protocol of Damgard et al. (ePrint 2016). Like TinyTabl...
AES is often considered as a target of such analyses, simply because AES or its building blocks are used in many settings that go beyond classical encryption. The most recent known-key model of Gilber...
Analysis of AES, SKINNY, and Others with Constraint Programming
Differential Cryptanalysis Integral Cryptanalysis Constraint Programming
2017/2/24
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show ...
AES-GCM-SIV: Specification and Analysis
modes of operation nonce-misuse resistance security bounds
2017/2/24
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined in the CFRG specification \cite{CFRG}. This mode differs from the original GCM-SIV mode that was de...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
AES is probably the most widely studied and used block cipher. Also versions with a reduced number of rounds are used as a building block in many cryptographic schemes, e.g. several candidates of the ...
An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm
Advanced Encryption Standard (AES) Rinjdael Cryptography
2016/12/10
We propose an efficient hardware architecture design & implementation of Advanced Encryption Standard (AES). The AES algorithm defined by the National Institute of Standard and Technology (NIST) of Un...
Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016
hite-Box Cryptanalysis Side-Channel Attack Software Implementation
2016/12/10
The security requirement of white-box cryptography (WBC) is that it should protect the secret key from a white-box security model that permits an adversary who is able to entirely control the executio...
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core
AES 128 Serialized Implementation
2016/12/8
The implementation of the AES encryption core by Moradi
et al. at Eurocrypt 2011 is one of the smallest in terms of gate area.
The circuit takes around 2400 gates and operates on an 8 bit datapath.
...
Statistical Analysis for Access-Driven Cache Attacks Against AES
AES side-channel analysis access-driven cache attacks
2016/12/8
In recent years, side-channel timing attacks utilizing architectural
behavior have been applied to cloud settings, presenting a realistic
and serious cyber threat. Access-driven cache attacks allow ...
Atomic-AES v 2.0
AES 128 Serialized Implementation
2016/12/8
Very recently, the Atomic AES architecture that provides dual functionality of the AES encryption
and decryption module was proposed. It was surprisingly compact and occupied only around 2645
GE of ...