搜索结果: 76-90 共查到“军事学 differential”相关记录263条 . 查询时间(0.336 秒)
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
AES differential fault analysis side-channel attacks
2016/12/8
Differential fault analysis attack is a kind of serious threat to cryptographic devices.
Previous protection schemes for crypto devices are not designed specifically against this kind of
attacks. At...
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
Cryptanalysis Impossible differential attacks Tweakable
2016/12/7
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle etet alal. in CRYPTO 2016. SKINNY-nn-tt is a block cipher with nn-bit state and tt-bit tweakey (key and tweak). It is desi...
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Symmetric cryptography cryptanalysis tweakable block cipher
2016/12/7
At CRYPTO'16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with SIMON. SKINNY can be implemented efficiently in both soft- and hardware, possess...
The security of SHA-3 against different kinds of attacks are of vital importance for crypto systems with SHA-3 as the security engine. In this paper, we look into the differential fault analysis of SH...
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
Block ciphers Cryptanalysis
2016/6/27
The algorithm presented in this paper computes a maximum probability differential characteristic in a Substitution-Permutation Network (or SPN). Such characteristics can be used to prove that a cipher...
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
fault analysis authenticated encryption PAEQ
2016/6/20
This work exploits internal differentials within a cipher in the context of Differential Fault Analysis (DFA). This in turn overcomes the nonce barrier which acts as a natural counter-measure against ...
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
SIMON Lightweight block cipher Integral attack
2016/6/20
SIMON is a lightweight block cipher designed by NSA in 2013. NSA presented the specification and the implementation efficiency, but they did not provide detailed security analysis nor the design ratio...
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
automatic search meet-in-the-middle impossible truncated differential
2016/6/7
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at...
Impossible Differential Cryptanalysis of Midori
light weight block ciphers impossible differential cryptanalysis
2016/6/2
Midori is a light weight block cipher recently presented by Banik et al in ASIACRYPT 2015. There are two versions of Midori with state sizes of 64-bit and 128-bit respectively. The round function is b...
Truncated, Impossible, and Improbable Differential Analysis of Ascon
Ascon Truncated Differential Impossible Differential
2016/5/23
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition
for Authenticated Encryption: Security, Applicability, and Robustness. So far, succe...
Multiple Differential Cryptanalysis: A Rigorous Analysis
multiple differential cryptanalysis Chernoff bounds martingales
2016/4/26
Statistical analysis of multiple differential attacks are considered in this paper. Following the work of
Blondeau and G磂rard, the most general situation of multiple differential attack where there a...
Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model
ARX Cipher Stream Cipher ChaCha, Salsa
2016/4/15
While \textsf{Salsa} and \textsf{ChaCha} are well known software oriented stream ciphers, since the work of Aumasson et al in FSE 2008 there aren't many significant results against them. The basic mod...
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or
Finite automaton ARX cipher Modulo addition
2016/4/7
Inspired by Fu et al. work on modeling the exclusive-or differential property of the modulo addition as an mixed-integer programming problem, we propose a method with which any finite automaton can be...
Note on Impossible Differential Attacks
truncated impossible differential cryptanalysis block cipher
2016/4/6
While impossible differential cryptanalysis is a well-known and popular cryptanalytic method, errors in the analysis are often discovered and many papers in the literature present flaws. Wishing to so...
Automatic Differential Analysis of ARX Block Ciphers: with Application to SPECK and LEA
ARX SPECK LEA
2016/3/1
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with respect to XOR-difference, and develop Mouha et al.'s framework of finding differential characteristics by...