搜索结果: 61-75 共查到“军事学 differential”相关记录263条 . 查询时间(0.236 秒)
New techniques for trail bounds and application to differential trails in Keccak
differential cryptanalysis trail weight bounds
2017/2/28
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
Round-Robin Differential Phase-Shift (RRDPS) is a Quantum Key Distribution (QKD) scheme proposed by Sasaki, Yamamoto and Koashi in 2014. It works with high-dimensional quantum digits (qudits). Its mai...
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
ARX structure Differential trails Automatic search algorithm
2017/2/20
In this paper, we suggest an advanced method searching for differential trails of block cipher with ARX structure. We
use two techniques to optimize the automatic search algorithm of differential tra...
Lightweight stream ciphers have received serious attention in the last few years. The present design paradigm considers very small state (less than twice the key size) and use of the secret key bits d...
AES is probably the most widely studied and used block cipher. Also versions with a reduced number of rounds are used as a building block in many cryptographic schemes, e.g. several candidates of the ...
In this paper, a new tool searching for impossible differentials against symmetric-key primitives is presented. Compared to the previous tools, our tool can detect any contradiction between input and ...
Impossible Differential Attack on Simpira v2
Simpira-4 impossible differential attack Super S-box
2016/12/29
Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016 which can be used to construct high throughput block ciphers using the Even-Mansour construction, permutation-based hash...
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
cryptanalysis tweakable block cipher
2016/12/29
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except for the tweak, which renders it a...
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
AES block ciphers S-box
2016/12/26
Differential power analysis targets S-boxes to break ciphers that resist cryptanalysis. We relax cryptanalytic constraints to lower S-box leakage, as quantified by the transparency order. We apply gen...
Impossible differential attack is one of powerful methods for analyzing encryption algorithms. When designing cryptographic algorithms, it must be safe for impossible differential attacks. In case of ...
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity
Differentially 44-uniform function Projected differential spectrum Substitution boxes
2016/12/12
Recently, many new classes of differentially 44-uniform permutations have been constructed. However, it is difficult to decide whether they are CCZ-inequivalent or not. In this paper, we propose a new...
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
differential privacy lower bounds
2016/12/10
"Concentrated differential privacy" was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many privacy-preserving computations. We pr...
Separating Computational and Statistical Differential Privacy in the Client-Server Model
differential privacy computational differential privacy witness indistinguishability
2016/12/10
Differential privacy is a mathematical definition of privacy for statistical data analysis. It
guarantees that any (possibly adversarial) data analyst is unable to learn too much information
that is...
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size $2^{4k+2}$
Boolean function Sbox APN
2016/12/9
The existence of Almost Perfect Nonlinear (APN) permutations operating on an even number of variables was a long-standing open problem, until an example with six variables was exhibited by Dillon et a...