军事学 >>> 军事学
搜索结果: 46-51 共查到军事学 differential cryptanalysis相关记录51条 . 查询时间(0.098 秒)
This paper presents an improved impossible differential at- tack on the new block cipher CLEFIA which is proposed by Sony Cor- poration at FSE 2007. Combining some observations with new tricks, we ...
We present an attack on Salsa20 reduced to five of its twenty rounds. This attack uses many clusters of truncated differentials and requires 2165 work and 26 plaintexts.
The key schedule of the Data Encryption Standard is analyzed, and it is shown that the properties of the permuted choice PC-2 transformation and the number of bits that are left shifted during the k...
This paper studies the security of the block ciphers ARIA and Camellia against impossible differential cryptanalysis. Our work im- proves the best impossible differential cryptanalysis of ARIA and C...
In this paper we present a general framework for the application of the ideas of differential cryptanalysis to stream ciphers. We demonstrate that some differences in the key (or the initial state o...
PRESENT is proposed by A.Bogdanov et al. in CHES 2007 for extremely constrained environments such as RFID tags and sensor networks. In this paper, we ¯nd out the di®erential characteristic...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...