搜索结果: 1-15 共查到“军事学 nonlinear”相关记录37条 . 查询时间(0.046 秒)
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
block ciphers Boolean functions non-linearity
2019/1/2
Recent papers show how to construct polynomial invariant attacks for block ciphers, however almost all such results are somewhat weak: invariants are simple and low degree and the Boolean functions te...
Distinguishing Error of Nonlinear Invariant Attacks
correlation uniform random function uniform random permutation
2018/11/7
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daeman and Rijmen (2007) had obtained the distributions of the correlations ...
A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers
Cube attacks Linearity tests Quadracity tests
2018/3/6
In this paper, we study experimental cube attacks against Trivium-like ciphers and we focus on improving nonlinear superpolies recovery. We first present a general framework in cube attacks to test no...
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling
memory-hard functions pebbling space-time trade-offs
2018/3/5
Pebble games were originally formulated to study time-space tradeoffs in computation, modeled by games played on directed acyclic graphs (DAGs). Close connections between pebbling and cryptography hav...
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations
correlation uniform random function uniform random permutation
2017/12/25
Daeman and Rijmen had derived the distributions of correlations between linear combinations of the input and output of uniform random functions and uniform random permutations. We generalise their res...
Short Solutions to Nonlinear Systems of Equations
signature scheme hard problem post-quantum
2017/12/6
This paper presents a new hard problem for use in cryptography, called Short Solutions to Nonlinear Equations (SSNE). This problem generalizes the Multivariate Quadratic (MQ) problem by requiring the ...
Model-counting Approaches For Nonlinear Numerical Constraints
Side-channel Attacks Modulo Exponentiation Quantitative Information Flow
2017/3/21
Model counting is of central importance in quantitative reasoning about systems. Examples include computing the probability that a system successfully accomplishes its task without errors, and measuri...
Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64
Nonlinear invariant attack Boolean function Ciphertext-only attack
2016/7/29
In this paper we introduce a new type of attack, called nonlinear invariant attack.
As application examples, we present new attacks that are able to distinguish the full versions
of the (tweakable) ...
Linearization of Multi-valued Nonlinear Feedback Shift Registers
Shift register Semi-tensor product state transition matrix
2016/1/3
The Linearization of Nonlinear feedback shift registers (NFSRs) is to find their state transition matrices. In this paper,
we investigate the linearization multi-valued NFSRs by considering it as a l...
Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers
Nonlinear feedback shift register Semi-tensor product State transition matrix
2016/1/3
In this paper, we study stability and linearization of multivalued
nonlinear feedback shift registers which are considered as logic
networks. First, the linearization of multi-valued nonlinear feedb...
De Bruijn Sequences from Nonlinear Feedback Shift Registers
De Bruijn sequence feedback shift register cycle joining method
2015/12/29
We continue the research of Jansen et al. (IEEE Trans on Information Theory 1991)
to construct De Bruijn sequences from feedback shift registers (FSRs) that contain
only very short cycles. Firstly, ...
An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)
public-key cryptography
2014/3/6
We propose a general framework to develop fully homomorphic encryption schemes (FHE) without using Gentry's technique. Initially, a private-key cryptosystem is built over $\mathbb{Z}_n$ ($n$ being an ...
Multiplicative linear secret sharing is a fundamental notion in the area of secure multi-party computation (MPC) and, since recently, in the area of two-party cryptography as well. In a nutshell, this...
A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
nonlinearity symmetric ciphers
2014/3/10
Criteria based on the analysis of the properties of vectorial Boolean functions for selection of substitutions (S-boxes) for symmetric cryptographic primitives are given. We propose an improved gradie...
Searching for Nonlinear Feedback Shift Registers with Parallel Computing
maximum period quadratic m-sequences
2014/3/10
Nonlinear feedback shift registers (NLFSRs) are used to construct pseudorandom generators for stream ciphers. Their theory is not so complete as that of linear feedback shift registers (LFSRs). In gen...