搜索结果: 106-120 共查到“军事学 differential”相关记录263条 . 查询时间(0.411 秒)
Differential Power Analysis of a McEliece Cryptosystem
Differential Power Analysis McEliece Cryptosystem QC-MDPC Codes
2016/1/8
This work presents the first differential power analysis of an implementation of the McEliece
cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the ef-
fi...
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Boomerang Differential Trails SAT-Based Constraint Solver URSA
2016/1/8
In order to obtain differential patterns over many rounds of a cryptographic primitive,
the cryptanalyst often needs to work on local differential trail analysis. Examples include
merging two differ...
On the Optimality of Differential Fault Analyses on CLEFIA
CLEFIA Differential Fault Analysis Fault Attack
2016/1/8
Differential Fault Analysis is a powerful cryptanalytic tool to reveal secret keys of cryptographic algorithms. By corrupting the computation of an algorithm, an attacker gets additional information a...
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Stream Cipher Differential Fault Attack Multi-Bit Fault
2016/1/7
Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this
paper we present a generic attack strategy that allows the adversary to challenge the cipher under
different mult...
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
block ciphers impossible differential attacks CLEFIA
2016/1/7
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against
block ciphers. These attacks, even if extensively used, remain not fully understood because of thei...
SipHash is an ARX based message authentication code developed
by Aumasson and Bernstein. SipHash was designed to be fast
on short messages. Already, a lot of implementations and applications
for Si...
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Automatic cryptanalysis Related-key differential cryptanalysis Linear cryptanalysis
2016/1/7
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of
the differential and linear behavior of a wide range of block ciphers. We point out that the differential
behav...
Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis
fault-based attacks differential fault analysis PRINCE
2016/1/6
State-of-the-art fault-based cryptanalysis methods are capable of breaking most recent ciphers after only a few fault injections. However, they require temporal and spatial accuracies of fault injecti...
Differential Factors: Improved Attacks on SERPENT
S-box differential factor Serpent differential-linear attack
2016/1/6
A differential attack tries to capture the round keys corresponding
to the S-boxes activated by a differential. In this work, we
show that for a fixed output difference of an S-box, it may not be po...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Clock glitch detection AES differential fault analysis
2016/1/6
Clock glitch based Differential Fault Analysis (DFA) attack is a serious threat to cryptographic
devices. Previous error detection schemes for cryptographic devices target improving the
circuit reli...
Differential Analysis of Block Ciphers SIMON and SPECK
symmetric-key differential trail tools for cryptanalysis
2016/1/6
In this paper we continue the previous line of research on the analysis of the differential
properties of the lightweight block ciphers Simon and Speck. We apply a recently proposed technique
for au...
Improved Differential Analysis of Block Cipher PRIDE
Block Cipher PRIDE Differential attack
2016/1/5
In CRYPTO 2014 Albrecht et al. brought in a 20-round iterative
lightweight block cipher PRIDE which is based on a good linear
layer for achieving a tradeoff between security and efficiency. A recent...
Related-Key Differential Attack on Round Reduced RECTANGLE-80
RECTANGLE block cipher Mixed-integer linear programming Related-key differential attack
2016/1/5
RECTANGLE is a newly proposed lightweight block cipher which allows fast implementations for multiple platforms by using bit-slice techniques. It is an iterative 25-round SPN block cipher with a 64-bi...
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Sboxes affine equivalence differential cryptanalysis
2016/1/4
This paper investigates the effect of affine transformations of the Sbox on the maximal expected differential probability MEDP and linear potential MELP over two rounds of a substitution-permutation n...
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Automatic cryptanalysis Related-key differential attack Mixed-integer Linear Programming
2016/1/4
In IACR ePrint 2014/747, a method for constructing mixed-integer linear programming (MILP) models whose feasible regions are exactly the sets of all possible differential (or linear) characteristics f...