搜索结果: 1-12 共查到“军事学 observations”相关记录12条 . 查询时间(0.063 秒)
Recently Bar-On et al. proposed the DLCT for a tighter analysis of probabilities for differential-linear distinguishers. We extend the analysis of the DLCT, and gain new insights about this notion.
SIMON and SPECK families of block ciphers are well-known lightweight ciphers designed by NSA. In this note, based on the previous investigations on SIMON, a closed formula for the squared correlations...
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Dynamic Cube attack Division Property MILP
2018/11/6
Recently, another kind of dynamic cube attack is proposed by Fu et al. With some key guesses and a transformation in the output bit, they claim that, when the key guesses are correct, the degree of th...
New Observations on Invariant Subspace Attack
Invariant subspace attack AES-like Lightweight block ciphers
2017/3/28
Invariant subspace attack is a novel cryptanalytic technique which breaks several recently proposed lightweight block ciphers. In this paper, we propose a new method to bound the dimension of some inv...
In this note we re-evaluate the Eurocrypt'16 paper by Zhang et al. in the area of LPN solving algorithms. We present the history of LPN solving algorithms and give the general description of the algor...
Observations on the SIMON block cipher family
SIMON differential cryptanalysis linear cryptanalysis
2016/1/4
In this paper we analyse the general class of functions underlying
the Simon block cipher. In particular, we derive efficiently computable
and easily implementable expressions for the exact differen...
From Camellia to p-Camellia: Some Observations on MISTY Structure with SPN Round Function
Block ciphers Camellia p-Camellia Feistel MISTY SPN Structural properties
2011/1/5
At AFRICACRYPT 2010, a parallelized version of the block cipher Camellia, called p-Camellia, was proposed. The high level structure of p-Camellia is MISTY-type, while the round function is SPN-type. I...
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
certificate-based encryption security model generic construction certificateless public key encryption standard model
2010/12/9
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which was introduced to solve the certificate management problem in traditional public key encryption (PKI). It combines PKE ...
The 128-bit block cipher TWIS was proposed by Ojha et al
in 2009. It is a lightweight block cipher and its design is inspired from
CLEFIA. In this paper, we first study the properties of TWIS struct...
In this note we discuss some observation of the SHA-3 candidate SHAMATA [1]. We ob-
serve that its internal block cipher is very weak, which could possibly lead to an attack on the hash function.
In this paper, we use linear approximations of the addition modulo 2n of three n-bit integers
to identify linear approximations of g1, g2, the feedback functions of HC-128. This, in turn, shows that
...
About Filiol’s Observations on DES, AES and Hash Functions
block ciphers DES AES hash functions
2009/4/15
Recently Filiol proposed to test cryptographic algorithms by making statistics
on the number of low degree terms in the boolean functions. The paper has been
published on eprint on 23th of July 2002...