搜索结果: 1-9 共查到“军事学 Related Key differential”相关记录9条 . 查询时间(0.156 秒)
Related-Key Differential Slide Attack Against Fountain V1
lightweight cryptography Fountain slide attacks
2019/8/14
The stream cipher FOUNTAIN was introduced in April 2019 as one of the candidates in the NIST lightweight crypto standardization process. In this paper we introduce a slide attack that leads to the con...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Automatic cryptanalysis Related-key differential cryptanalysis Linear cryptanalysis
2016/1/7
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of
the differential and linear behavior of a wide range of block ciphers. We point out that the differential
behav...
Related-Key Differential Attack on Round Reduced RECTANGLE-80
RECTANGLE block cipher Mixed-integer linear programming Related-key differential attack
2016/1/5
RECTANGLE is a newly proposed lightweight block cipher which allows fast implementations for multiple platforms by using bit-slice techniques. It is an iterative 25-round SPN block cipher with a 64-bi...
The Resistance of PRESENT-80 Against Related-Key Differential Attacks
secret-key cryptography
2014/3/10
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that no related-key differential charact...
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks
Differential attack Active S-box
2014/3/10
Counting the number of active S-boxes is a common way to evaluate the security of symmetric key cryptographic schemes against differential attack. Based on Mixed Integer Linear Programming (MILP), Mou...
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
Related-key attacks differential cryptanalysis boomerang attacks AES key schedule
2011/2/23
In this paper, we summarize the recent related-key differential and boomerang attacks on AES by Biryukov et al. and present a framework for protection against these attacks. Then we study an alternati...
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
secret-key cryptography / Related-key attacks differential cryptanalysis boomerang attacks AES key schedule
2012/3/29
In this paper, we summarize the recent related-key differential and boomerang attacks on AES by Biryukov et al. and present a framework for protection against these attacks. Then we study an alternati...
On Resistance of DES to Related-Key Differential Cryptanalysis
DES differential cryptanalysis related-key attacks
2009/1/21
The key schedule of the Data Encryption Standard is analyzed, and it is shown that the
properties of the permuted choice PC-2 transformation and the number of bits that are left
shifted during the k...