军事学 >>> 军事学
搜索结果: 1-8 共查到军事学 Algebraic Attack相关记录8条 . 查询时间(0.075 秒)
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation sys...
Algebraic Attack Efficiency versus S-box Representation     Algebraic cryptanalysis  Small scaled AES  SAT-solver       font style='font-size:12px;'> 2017/2/20
Algebraic analysis of block ciphers aims at finding the secret key by solving a collection of polynomial equations that describe the internal structure of a cipher for chosen observations of plaintext...
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher     Boolean Function  Grain v1  Grain-128a       font style='font-size:12px;'> 2016/1/8
In 2005, Hell, Johansson and Meier submitted a stream cipher proposal named Grain v1 to the estream call for stream cipher proposals and it also became one estream finalists in the hardware category...
Advanced Algebraic Attack on Trivium     Trivium  algebraic modelling  similar variables       font style='font-size:12px;'> 2016/1/6
This paper presents an algebraic attack against Trivium that breaks 625 rounds using only 4096 bits of output in an overall time complexity of 242.2 Trivium computations. While other attacks can do be...
Methods are presented to derive with the aid of the computer mathematics software system SageMath the Multivariate Quadratic equation systems (MQ) for the input and output bit variables of a crypto...
An Improved Algebraic Attack on Hamsi-256     Algebraic attacks  second preimages  hash functions  Hamsi       font style='font-size:12px;'> 2010/11/26
Hamsi is one of the $14$ second-stage candidates in NIST's SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version published by Thomas Fuhr ...
Relation for Algebraic Attack on E0 combiner      Relation  Algebraic Attack  E0 combiner        font style='font-size:12px;'> 2010/3/16
The low degree relation for algebraic attacks on E0 combiner given in [1] had an error. The correct version of low degree relation for the E0 combiner for use in algebraic attack is given.
In [19] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known as MRHS, and we present a sp...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...