搜索结果: 1-7 共查到“军队指挥学 Lightweight block cipher”相关记录7条 . 查询时间(0.109 秒)
Systematization Of A 256-Bit Lightweight Block Cipher Marvin
Lightweight Cryptography Block ciphers LS Designs
2018/1/19
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be se...
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
balanced biclique attack star-based biclique PRINCE
2016/1/27
Inspired by the paper [10], using better differential characteristics in the biclique
construction, we give another balanced biclique attack on full rounds PRINCE with the lower
complexity in this p...
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
lightweight cryptography block cipher design bit-slice
2016/1/26
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main
idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice
techniques. RECTAN...
FeW: A Lightweight Block Cipher
Block Cipher Feistel structure Generalised Feistel structure,
2016/1/23
In this paper, we propose a new lightweight block cipher called FeW1 which encrypts 64-bit plaintext using key size 80/128 bits and produces 64-bit ciphertext. FeW is a software oriented design wi...
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit.
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit. Our security eva...
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
cryptanalysis meet-in-the-middle attacks block cipher key schedule lightweight cipher key-recovery RFID
2010/10/20
In this paper we describe a variant of existing meet-in-the middle attacks on block ciphers. As an application, we propose meet-in- the-middle attacks that are applicable to the KTANTAN family of bloc...