搜索结果: 1-15 共查到“军队指挥学 Block ciphers”相关记录106条 . 查询时间(0.076 秒)
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule
Key Recovery Rectangle Attack SKINNY
2019/6/19
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers ...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Authenticated encryption beyond-birthday-bound security tweakable block- cipher
2019/4/3
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Symmetric-key cryptography tweakable block ciphers zero-correlation
2019/3/1
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, ...
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
random permutation mode secure computation
2019/1/26
Many implementations of secure computation use fixed-key AES (modeled as a random permutation); this results in substantial performance benefits due to existing hardware support for~AES and the abilit...
SIMON and SPECK families of block ciphers are well-known lightweight ciphers designed by NSA. In this note, based on the previous investigations on SIMON, a closed formula for the squared correlations...
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
block ciphers Boolean functions Algebraic Normal Form
2018/11/19
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt’95 (adapted to Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making such attacks wo...
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions
provable security Davies-Meyer one-wayness, non-invertibility
2018/11/16
We present hash functions that are almost optimally one-way in the quantum setting. Our hash functions are based on the Merkle-Damgård construction iterating a Davies-Meyer compression function, ...
FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
Lightweight cryptography PRESENT
2018/11/5
Lightweight block ciphers are today of paramount importance to provide security services in constrained environments. Recent studies have questioned the security properties of PRESENT, which makes it ...
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Block cipher LowMC Picnic signature algorithm linear equivalence
2018/8/28
LowMC is a block cipher family that is optimized for practical instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. It was designed in 2015 by Albrecht e...
复旦大学计算机科学与技术学院信息安全课件 Modern Block Ciphers。
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Symmetric-key cryptography differential cryptanalysis lightweight cryptography
2018/7/19
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
XS-circuits describe block ciphers that utilize 2 operations: X) bitwise modulo 2 addition of binary words and S) substitution of words using key-dependent S-boxes with possibly complicated internal s...
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
substitution-permutation networks tweakable block ciphers domain extension of block ciphers
2018/5/28
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wnwn-bit (tweakable) block cipher from nn-bit public permutations. Many widely deployed block ciphers are part...