搜索结果: 46-60 共查到“军事学 differential”相关记录263条 . 查询时间(0.071 秒)
Differential Fault Attacks on Deterministic Signatures
Public-key algorithms Elliptic curve cryptography Digital signatures
2017/10/9
Deterministic signature schemes are becoming more popular, as illustrated by the deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need for high-quality randomness mig...
On differential equivalence of APN functions
Boolean function Almost perfect nonlinear function Almost bent function
2017/9/25
For a given vectorial Boolean function FF from Fn2F2n to itself it was defined an associated Boolean function γF(a,b)γF(a,b) in 2n2n variables by C.~Carlet, P.~Charpin, V.~Zinoviev in 1998 that takes ...
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme. Our proof consists of the following steps. We construct an EPR var...
Structural Truncated Differential Attacks on round-reduced AES
AES Secret-Key Distinguisher Key-Recovery Attack
2017/9/1
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES has been presented. Although it allows to distinguish a random permutation from an AES like one, it seems (rather) hard to exploit ...
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Differential Fault Attack Stream Cipher Grain v1
2017/7/14
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In th...
Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete k...
Differential Attacks: Using Alternative Operations
block ciphers differential cryptanalysis distinguisher
2017/6/27
Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed ...
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
secret-key cryptography known APN functions
2017/6/6
For every positive integers nn, mm and every even positive integer δδ, we derive inequalities satisfied by the Walsh transforms of all vectorial (n,m)(n,m)-functions and prove that the case of equalit...
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
differential cryptanalysis independent S-box fixed key
2017/5/31
The current paper studies the probability of differential characteristics for an unkeyed (or with a fixed key) construction. Most notably, it focuses on the gap between two probabilities of differenti...
Constructing Multidimensional Differential Addition Chains and their Applications
differential addition chains side channel resistance elliptic curves
2017/4/12
We propose new algorithms for constructing multidimensional differential addition chains and for performing multidimensional scalar point multiplication based on these chains. Our algorithms work in a...
Impossible Differential Attack on Midori128 Using Rebound-like Technique
cryptanalysis lightweight block cipher impossible differential
2017/4/5
Midori is a family of lightweight block cipher proposed by Banik et al. in ASIACRYPT 2015 and it is optimized with respect to the energy consumed by the circuit per bit in encryption or decryption ope...
Involutory Differential 4-Uniform Permutations from Known Constructions
Nonlinearity Algebraic degree
2017/4/5
Substitution box (S-box) is an important component of block ciphers for providing confusion into the cryptosystems. The functions used as S-boxes should have low differential uniformity, high nonlinea...
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
White-box cryptography power analysis differential computation analysis
2017/3/27
Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can be performed without detailed knowledge o...
Optimal Differential Trails in SIMON-like Ciphers
automatic search differential trail SIMON
2017/2/28
In the present paper, we propose an automatic search algorithm for optimal differential trails in SIMON-like ciphers. First, we give a more accurate upper bound on the differential probability of SIMO...