搜索结果: 1-15 共查到“军事学 Algebraic attacks”相关记录18条 . 查询时间(0.125 秒)
Algebraic Attacks on Human Identification Protocols
Human identification protocols linear system of congruences learning with errors
font style='font-size:12px;'>
2016/1/7
Human identification protocols are challenge-response protocols that rely on human computational
ability to reply to random challenges from the server based on a public function of a shared
secret a...
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks
Boolean functions cryptography fast algebraic attacks
font style='font-size:12px;'>
2015/12/30
Boolean functions used in stream ciphers should have many cryptographic properties in order to help resist different kinds of cryptanalytic attacks. The resistance of Boolean functions against fast al...
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
stream ciphers algebraic attacks Welch-Gong
font style='font-size:12px;'>
2015/12/30
In this paper we investigate univariate algebraic attacks on
filter generators over extension fields Fq = F2n with focus on the WelchGong
(WG) family of stream ciphers. Our main contribution is to b...
Protecting Obfuscation Against Algebraic Attacks
Obfuscation Multilinear Maps
font style='font-size:12px;'>
2014/3/7
Recently, Garg, Gentry, Halevi, Raykova, Sahai, and Waters (FOCS 2013) constructed a general-purpose obfuscating compiler for NC1 circuits. We describe a simplified variant of this compiler, and prove...
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity
Algebraic immunity nonlinearity metaheuristics simulated annealing
font style='font-size:12px;'>
2013/2/21
Using simulated annealing, we derive several equivalence classes of balanced Boolean functions with optimum algebraic immunity, fast algebraic resistance, and maximum possible algebraic degree. For nu...
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
Boolean functions balancedness algebraic immunity fast algebraic attack
font style='font-size:12px;'>
2011/7/25
In this paper, we present a new combinatorial conjecture about binary strings. Based on the new conjecture, two classes of Boolean functions of $2k$ variables with optimal algebraic immunity are propo...
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
secret-key cryptography / Boolean functions balancedness algebraic immunity fast algebraic attack algebraic degree nonlinearity
font style='font-size:12px;'>
2012/3/27
In this paper, we present a new combinatorial conjecture about binary strings. Based on the new conjecture, two classes of Boolean functions of $2k$ variables with optimal algebraic immunity are propo...
Algebraic attacks specialized for F2
Algebraic attacks F2 symmetric cryptography
font style='font-size:12px;'>
2009/6/15
In his landmark paper, Shannon stated that breaking a good cipher should
'require at least as much work as solving a system of simultaneous equations
in a large number of unknowns of a complex type'...
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
London Oyster card Dutch public transit OV-Chipcard Boston’s CharlieCard RFID tags
font style='font-size:12px;'>
2009/6/3
MiFare Crypto 1 is a lightweight stream cipher used in London’s
Oyster card, Netherland’s OV-Chipcard, US Boston’s CharlieCard,
and in numerous wireless access control and ticketing systems worldwid...
New Differential-Algebraic Attacks and Reparametrization of Rainbow
rank differential attack algebraic attack
font style='font-size:12px;'>
2009/6/3
A recently proposed class of multivariate Public-Key Cryptosystems,
the Rainbow-Like Digital Signature Schemes, in which successive
sets of central variables are obtained from previous ones by solvi...
Algebraic Attacks on Summation Generators
stream ciphers algebraic attacks summation generators
font style='font-size:12px;'>
2009/4/10
We apply the algebraic attacks on stream ciphers with memories
to the summation generator. For a summation generator that uses n LFSRs,
an algebraic equation relating the key stream bits and LFSR ou...
Algebraic Attacks on Combiners with Memory and Several Outputs
algebraic attacks on stream ciphers pseudo-random generators multivariate equations
font style='font-size:12px;'>
2009/4/9
Algebraic attacks on stream ciphers [14] recover the key by
solving an overdefined system of multivariate equations. Such attacks
can break several interesting cases of LFSR-based stream ciphers, wh...
On the Existence of low-degree Equations for Algebraic Attacks
algebraic attacks block ciphers keystream generators
font style='font-size:12px;'>
2009/3/27
Algebraic attacks on block ciphers and stream ciphers have gained more
and more attention in cryptography. The idea is to express a cipher by a system
of equations whose solution reveals the secret ...
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
Complexity Fast Algebraic Attacks Stream Ciphers
font style='font-size:12px;'>
2009/3/25
Recently proposed algebraic attacks [AK03,CM03] and fast algebraic attacks [A04,C03] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exponential in ...
How Fast can be Algebraic Attacks on Block Ciphers ?
algebraic attacks on block ciphers AES Rijndael Serpent multivariate quadratic equations
font style='font-size:12px;'>
2008/11/20
In this paper we give a specification of a new block cipher
that can be called the Courtois Toy Cipher (CTC). It is quite simple,
and yet very much like any other known block cipher. If the paramete...