搜索结果: 121-135 共查到“军事学 differential”相关记录263条 . 查询时间(0.115 秒)
ICEPOLE is a CAESAR candidate with the intermediate level of robustness under
nonce misuse circumstances in the original document. In particular, it was claimed that
key recovery attack against ICEP...
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
Impossible Differential Integral Zero Correlation Linear
2016/1/3
As two important cryptanalytic methods, impossible differential cryptanalysis and integral cryptanalysis have attracted much attention in recent years. Although relations among other important cryptan...
New Links Between Differential and Linear Cryptanalysis
statistical cryptanalysis block cipher key-alternating block cipher
2016/1/3
Recently, a number of relations have been established among
previously known statistical attacks on block ciphers. Leander showed
in 2011 that statistical saturation distinguishers are on average eq...
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
statistical cryptanalysis block cipher chosen plaintext
2016/1/3
The mere number of various apparently different statistical attacks on block ciphers has raised the question about their relationships which would allow to classify them and determine those that give ...
In this paper, we analyse the higher order differential properties of NORX, an AEAD
scheme submitted to CAESAR competition. NORX is a sponge based construction. Previous efforts,
by the designers th...
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
TWINE LBlock meet-in-the-middle
2016/1/3
TWINE is a recent lightweight block cipher based on a Feistel structure. We first present two new attacks on TWINE-128 reduced to 25 rounds that have a slightly higher overall complexity than the 25-r...
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
SHA-3 Keccak internal differential
2016/1/3
We introduce internal differential boomerang distinguisher as a combination
of internal differentials and classical boomerang distinguishers. The new
boomerangs can be successful against cryptograph...
Improved Top-Down Techniques in Differential Cryptanalysis
differential cryptanalysis difference distribution tables iterative characteristics
2016/1/3
The fundamental problem of differential cryptanalysis is to
find the highest entries in the Difference Distribution Table (DDT) of a
given mapping F over n-bit values, and in particular to find the ...
Impossible Differential Cryptanalysis of Reduced Round SIMON
SIMON impossible differential bit condition
2015/12/31
Impossible differential is a useful method for cryptanalysis. SIMON is a light weight block cipher that has attracted lots of attention ever since its publication in 2013. In this paper we propose imp...
Achieving Differential Privacy with Bias-Control Limited Source
differential privacy imperfect randomness Bias-Control Limited source
2015/12/31
In the design of differentially private mechanisms, it’s usually
assumed that a uniformly random source is available. However, in many
situations it seems unrealistic, and one must deal with various...
Improved Higher-Order Differential Attacks on MISTY1
block cipher MISTY1 higher-order differential attack
2015/12/31
MISTY1 is a block cipher designed by Matsui in 1997. It is
widely deployed in Japan, and is recognized internationally as an European
NESSIE-recommended cipher and an ISO standard. Since its
introd...
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
decorrelation theory multidimensional linear cryptanalysis truncated differential cryptanalysis
2015/12/31
The decorrelation theory provides a different point of view
on the security of block cipher primitives. Results on some statistical attacks
obtained in this context can support or provide new insigh...
VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS
Boomerang Differential Higher Order, Impossible
2015/12/30
Block cipher is in vogue due to its requirement
for integrity, confidentiality and authentication.
Differential and Linear cryptanalysis are the basic techniques
on block cipher and till today many...
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers
lightweight cryptography hardware performance multiplicative complexity
2015/12/30
Lightweight cryptography is a rapidly evolving area of research and it has great impact especially on the
new computing environment called the Internet of Things (IoT) or the Smart Object networks (H...
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers
Differential Attack Fault Attack Grain Family
2015/12/30
Differential Fault Attack (DFA) has received serious attention in cryptographic literature
and very recently such attacks have been mounted against several popular stream ciphers for example
Grain v...