搜索结果: 1-5 共查到“军队指挥学 MISTY”相关记录5条 . 查询时间(0.035 秒)
Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)
S-Box Feistel network MISTY network
2015/12/24
The aim of this work is to find large S-Boxes, typically operating on 8 bits, having
both good cryptographic properties and a low implementation cost. Such S-Boxes are suitable
building-blocks in ma...
In this paper, we first prove beyond-birthyday-bound security for the Misty structure. Specifically, we show that an $r$-round Misty structure is secure against CCA attacks up to $O(2^{\frac{rn}{r+7}}...
From Camellia to p-Camellia: Some Observations on MISTY Structure with SPN Round Function
Block ciphers Camellia p-Camellia Feistel MISTY SPN Structural properties
2011/1/5
At AFRICACRYPT 2010, a parallelized version of the block cipher Camellia, called p-Camellia, was proposed. The high level structure of p-Camellia is MISTY-type, while the round function is SPN-type. I...
Generic Attacks on Misty Schemes -5 rounds is not enough-
Misty permutations pseudo-random permutations generic attacks on encryption schemes
2009/8/25
Misty schemes are classic cryptographic schemes used to construct pseudo-random permu-
tations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to n bits. These d
permutatio...