搜索结果: 1-15 共查到“军队指挥学 Differential Cryptanalysis”相关记录51条 . 查询时间(0.078 秒)
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach
Block Cipher Differential Cryptanalysis MILP
2019/1/9
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of symmetric-key primitives. For differential and linear cryptanalysis, MILP can be used to solve the two...
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
aes differential cryptanalysis tweakable block cipher
2018/11/12
The rapid distribution of lightweight devices raised the demand for efficient encryption and authenticated encryption schemes for small messages. For this purpose, Andreeva et al. recently proposed fo...
Differential Cryptanalysis in ARX Ciphers, Applications to LEA
Differential characteristics Nested Monte-Carlo Search ARX ciphers
2018/11/9
In this paper we focus on differential cryptanalysis dedicated to a particular class of cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the Nested Monte-Carlo Sear...
Differential cryptanalysis in ARX ciphers, Application to SPECK
Differential path Nested Monte-Carlo Search ARX ciphers
2018/11/9
In this paper, we propose a new algorithm inspired by Nested to find a differential path in ARX ciphers. In order to enhance the decision process of our algorithm and to reduce the search space of our...
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Symmetric-key cryptography differential cryptanalysis lightweight cryptography
2018/7/19
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
Differential Cryptanalysis of Round-Reduced Sparx-64/128
Symmetric-key cryptography cryptanalysis boomerang truncated differential
2018/4/11
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16. Similar to the wide-trail strategy, the LTS a...
Impossible Differential Cryptanalysis on Deoxys-BC-256
authenticated encryption block cipher Deoxys-BC
2018/1/15
Deoxys is a third-round candidate of the CAESAR competition. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block...
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Generalized Feistel Network Differential Analysis Chosen Ciphertext Attack
2017/12/19
Nachef et al used differential cryptanalysis to study four types of Generalized Feistel Scheme (GFS). They gave the lower bound of maximum number of rounds that is indistinguishable from a random perm...
Differential Cryptanalysis of 18-Round PRIDE
Block cipher PRIDE Differential cryptanalysis
2017/10/25
Impossible Differential Cryptanalysis of Reduced-Round SKINNY
Cryptanalysis Impossible differential attacks Tweakable
2016/12/7
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle etet alal. in CRYPTO 2016. SKINNY-nn-tt is a block cipher with nn-bit state and tt-bit tweakey (key and tweak). It is desi...
Impossible Differential Cryptanalysis of Midori
light weight block ciphers impossible differential cryptanalysis
2016/6/2
Midori is a light weight block cipher recently presented by Banik et al in ASIACRYPT 2015. There are two versions of Midori with state sizes of 64-bit and 128-bit respectively. The round function is b...
Multiple Differential Cryptanalysis: A Rigorous Analysis
multiple differential cryptanalysis Chernoff bounds martingales
2016/4/26
Statistical analysis of multiple differential attacks are considered in this paper. Following the work of
Blondeau and G磂rard, the most general situation of multiple differential attack where there a...
Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model
ARX Cipher Stream Cipher ChaCha, Salsa
2016/4/15
While \textsf{Salsa} and \textsf{ChaCha} are well known software oriented stream ciphers, since the work of Aumasson et al in FSE 2008 there aren't many significant results against them. The basic mod...
A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis
Side-channel distinguisher Confusion coefficient Kolmogorov- Smirnov analysis
2016/1/26
In this paper, we carry out a detailed mathematical study of
two theoretical distinguishers based on the Kolmogorov-Smirnov (KS)
distance. This includes a proof of soundness and the derivation of cl...
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm
Impossible differential cryptanalysis key recovery attack
2016/1/23
Impossible differential cryptanalysis has been proved to be one of the most powerful techniques to attack block ciphers. Based on the impossible differential paths, we can usually add several rounds...