搜索结果: 91-105 共查到“differential”相关记录1141条 . 查询时间(0.125 秒)
Lightweight stream ciphers have received serious attention in the last few years. The present design paradigm considers very small state (less than twice the key size) and use of the secret key bits d...
AES is probably the most widely studied and used block cipher. Also versions with a reduced number of rounds are used as a building block in many cryptographic schemes, e.g. several candidates of the ...
Differential expression of heat shock protein 90,70,60 in chicken muscles postmortem and its relationship with meat quality
Heat Shock Protein 90 Heat Shock Protein 70 Heat Shock Protein 60 Chicken Drip Loss
2017/3/7
The aim of this study was to investigate the expression of heat shock protein (HSP) 90, 70, and 60 in chicken muscles and their possible relationship with quality traits of meat.
In this paper, a new tool searching for impossible differentials against symmetric-key primitives is presented. Compared to the previous tools, our tool can detect any contradiction between input and ...
Impossible Differential Attack on Simpira v2
Simpira-4 impossible differential attack Super S-box
2016/12/29
Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016 which can be used to construct high throughput block ciphers using the Even-Mansour construction, permutation-based hash...
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
cryptanalysis tweakable block cipher
2016/12/29
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except for the tweak, which renders it a...
上海交通大学耳鼻咽喉科学英文版课件 Differential diagnosis of neck lump
上海交通大学 耳鼻咽喉科学 英文版 课件 Differential diagnosis of neck lump
2016/12/28
上海交通大学耳鼻咽喉科学英文版课件 Differential diagnosis of neck lump.
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
AES block ciphers S-box
2016/12/26
Differential power analysis targets S-boxes to break ciphers that resist cryptanalysis. We relax cryptanalytic constraints to lower S-box leakage, as quantified by the transparency order. We apply gen...
Impossible differential attack is one of powerful methods for analyzing encryption algorithms. When designing cryptographic algorithms, it must be safe for impossible differential attacks. In case of ...
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity
Differentially 44-uniform function Projected differential spectrum Substitution boxes
2016/12/12
Recently, many new classes of differentially 44-uniform permutations have been constructed. However, it is difficult to decide whether they are CCZ-inequivalent or not. In this paper, we propose a new...
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
differential privacy lower bounds
2016/12/10
"Concentrated differential privacy" was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many privacy-preserving computations. We pr...
Separating Computational and Statistical Differential Privacy in the Client-Server Model
differential privacy computational differential privacy witness indistinguishability
2016/12/10
Differential privacy is a mathematical definition of privacy for statistical data analysis. It
guarantees that any (possibly adversarial) data analyst is unable to learn too much information
that is...
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size $2^{4k+2}$
Boolean function Sbox APN
2016/12/9
The existence of Almost Perfect Nonlinear (APN) permutations operating on an even number of variables was a long-standing open problem, until an example with six variables was exhibited by Dillon et a...
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
AES differential fault analysis side-channel attacks
2016/12/8
Differential fault analysis attack is a kind of serious threat to cryptographic devices.
Previous protection schemes for crypto devices are not designed specifically against this kind of
attacks. At...
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
Cryptanalysis Impossible differential attacks Tweakable
2016/12/7
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle etet alal. in CRYPTO 2016. SKINNY-nn-tt is a block cipher with nn-bit state and tt-bit tweakey (key and tweak). It is desi...