搜索结果: 76-90 共查到“differential”相关记录1141条 . 查询时间(0.534 秒)
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Differential Fault Attack Stream Cipher Grain v1
2017/7/14
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In th...
Characterization of all possible faults in a cryptosystem exploitable for fault attacks is a problem which is of both theoretical and practical interest for the cryptographic community. The complete k...
Differential Attacks: Using Alternative Operations
block ciphers differential cryptanalysis distinguisher
2017/6/27
Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed ...
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
secret-key cryptography known APN functions
2017/6/6
For every positive integers nn, mm and every even positive integer δδ, we derive inequalities satisfied by the Walsh transforms of all vectorial (n,m)(n,m)-functions and prove that the case of equalit...
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
differential cryptanalysis independent S-box fixed key
2017/5/31
The current paper studies the probability of differential characteristics for an unkeyed (or with a fixed key) construction. Most notably, it focuses on the gap between two probabilities of differenti...
Constructing Multidimensional Differential Addition Chains and their Applications
differential addition chains side channel resistance elliptic curves
2017/4/12
We propose new algorithms for constructing multidimensional differential addition chains and for performing multidimensional scalar point multiplication based on these chains. Our algorithms work in a...
偏微分方程国际会议-丝路数学中心系列国际会议(International Conference on partial differential equations - International Conference on the mathematics of the Silk Road Series)
偏微分方程 国际会议 丝路数学中心 国际会议
2017/4/6
It is our great honour to welcome you to the International Conference on Partial Differential Equations-Silkroad Mathematics Center Series International Conferences, hosted jointly by the Chinese Math...
Impossible Differential Attack on Midori128 Using Rebound-like Technique
cryptanalysis lightweight block cipher impossible differential
2017/4/5
Midori is a family of lightweight block cipher proposed by Banik et al. in ASIACRYPT 2015 and it is optimized with respect to the energy consumed by the circuit per bit in encryption or decryption ope...
Involutory Differential 4-Uniform Permutations from Known Constructions
Nonlinearity Algebraic degree
2017/4/5
Substitution box (S-box) is an important component of block ciphers for providing confusion into the cryptosystems. The functions used as S-boxes should have low differential uniformity, high nonlinea...
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis
White-box cryptography power analysis differential computation analysis
2017/3/27
Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can be performed without detailed knowledge o...
Optimal Differential Trails in SIMON-like Ciphers
automatic search differential trail SIMON
2017/2/28
In the present paper, we propose an automatic search algorithm for optimal differential trails in SIMON-like ciphers. First, we give a more accurate upper bound on the differential probability of SIMO...
New techniques for trail bounds and application to differential trails in Keccak
differential cryptanalysis trail weight bounds
2017/2/28
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
Round-Robin Differential Phase-Shift (RRDPS) is a Quantum Key Distribution (QKD) scheme proposed by Sasaki, Yamamoto and Koashi in 2014. It works with high-dimensional quantum digits (qudits). Its mai...
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
ARX structure Differential trails Automatic search algorithm
2017/2/20
In this paper, we suggest an advanced method searching for differential trails of block cipher with ARX structure. We
use two techniques to optimize the automatic search algorithm of differential tra...