搜索结果: 91-105 共查到“军事学 AES”相关记录200条 . 查询时间(0.031 秒)
Buying AES Design Resistance with Speed and Energy
side channel attacks fault attacks AES
2015/12/24
Fault and power attacks are two common ways of extracting secrets from tamper-resistant chips. Although several protections have been proposed to thwart these attacks, resistant designs usually claim ...
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Cryptanalysis Time Redundancy Biased Faults
2015/12/24
Biased fault attacks such as the Differential Fault
Intensity Analysis (DFIA) have been a major threat to cryptosystems
in recent times. DFIA combines principles of side
channel analysis and fault ...
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
side-channel analysis fault attacks parity check countermeasure
2015/12/23
In this paper we study a parity check based countermeasure proposed by Chen
et al. that thwarts their attack by detecting byte fault injection during the AES key schedule
process.
The Cryptographics Algorithms AES and Twofish guarantee a high diffusion
with the use of fixed MDS matrices of size 4 × 4. In this article variations to the
Cryptographics Algorithms AES and Twofish...
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$
secret-key cryptography
2014/3/12
The Even-Mansour (EM) encryption scheme received a lot of attention in the last couple of years due to its exceptional simplicity and tight security proofs. The original $1$-round construction was nat...
This paper studies key-recovery attacks on AES-192 and PRINCE under single-key model by methodology of meet-in-the-middle attack. A new technique named key-dependent sieve is proposed to further reduc...
Another Nail in the Coffin of White-Box AES Implementations
AES Implementation Cryptanalysis
2014/3/11
The goal of white-box cryptography is to design implementations of common cryptographic algorithm (e.g. AES) that remain secure against an attacker with full control of the implementation and executio...
Revisiting the BGE Attack on a White-Box AES Implementation
White-box cryptography dual cipher
2014/3/11
White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Ch...
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
AES Related-Key
2014/3/12
While the symmetric-key cryptography community has now a good experience on how to build a secure and efficient fixed permutation, it remains an open problem how to design a key-schedule for block cip...
From oblivious AES to efficient and secure database join in the multiparty setting
cryptographic protocols / AES secure database join secure multi-party computation implementation
2013/4/18
AES block cipher is an important cryptographic primitive with many applications. In this work, we describe how to efficiently implement the AES-128 block cipher in the multiparty setting where the key...
The fragility of AES-GCM authentication algorithm
AES-GCM GHASH polynomial evaluation MAC message forgery OpenSSL
2013/4/18
A new implementation of the GHASH function has been recently committed to a Git version of OpenSSL, to speed up AES-GCM. We identified a bug in that implementation, and made sure it was quickly fixed ...
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
AES block ciphers cryptanalysis linear cryptanalysis
2013/4/18
In [eprint.iacr.org/2012/663] method of virtual isomorphisms of ciphers was applied for differential/linear cryptanalysis of AES. It was shown that AES seems to be weak against those attacks. That res...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a \emph...
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols – Extended Version
implementation / Side-Channel HO-SCA Glitches AES
2012/3/27
Higher-order side channel attacks (HO-SCA) is a powerful technique against cryptographic implementations and the design of appropriate countermeasures is nowadays an important topic. In parallel, anot...
Differential Fault Analysis of AES: Toward Reducing Number of Faults
secret-key cryptography / Cryptanalysis Side channel attacks Differential fault analysis Block ciphers AES
2012/3/28
Differential Fault Analysis (DFA) finds the key of a block cipher using differential information between correct and faulty ciphertexts obtained by inducing faults during the computation of ciphertext...