搜索结果: 1-15 共查到“军事学 Feistel”相关记录62条 . 查询时间(0.093 秒)
Collisions on Feistel-MiMC and univariate GMiMC
MiMC MPC symmetric cryptanalysis
font style='font-size:12px;'>
2019/8/22
MiMC and GMiMC are families of MPC-friendly block ciphers and hash functions. In this note, we show that the block ciphers MiMC-2n/n2n/n (or Feistel-MiMC) and univariate GMiMC are vulnerable to an att...
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Diffusion Round Feistel Permutations
font style='font-size:12px;'>
2019/5/23
The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were then proposed in the literature, leading to the Generalized Feistel Network, where the ...
Feistel Structures for MPC, and More
Feistel Multiplicative Complexity Algebraic Attack
font style='font-size:12px;'>
2019/4/22
We study approaches to generalized Feistel constructions with low-degree round functions with a focus on x → x^3. Besides known constructions, we also provide a new balanced Feistel construction...
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Generalized Feistel Scheme Quantum attack Simon's algorithm
font style='font-size:12px;'>
2019/4/1
Generalized Feistel Schemes (GFS) are important components of symmetric ciphers, which have been extensively researched in classical setting. However, the security evaluations of GFS in quantum settin...
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Generalized Feistel cipher Simon's algorithm Grover search,
font style='font-size:12px;'>
2019/4/1
A generalized Feistel cipher is one of the methods to construct block ciphers, and it has several variants. Dong, Li, and Wang showed quantum distinguishing attacks against the (2d−1)(2d−1...
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Feistel cipher Quantum chosen-ciphertext attacks Simon's algorithm
font style='font-size:12px;'>
2018/12/19
Seminal results by Luby and Rackoff show that the 3-round Feistel cipher is secure against chosen-plaintext attacks (CPAs), and the 4-round version is secure against chosen-ciphertext attacks (CCAs). ...
Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security
blockcipher provable security multi-user security
font style='font-size:12px;'>
2018/11/19
Our results hold in the multi-user setting as well, constituting the first non-trivial multi-user provable security results on Feistel ciphers. We finally demonstrate applications of our results on de...
Construction of Lightweight MDS Matrices from Generalized Feistel Structures
Lightweight cryptography MDS matrix Generalized Feistel Structures
font style='font-size:12px;'>
2018/11/12
This paper investigates the construction of lightweight MDS matrices with generalized Feistel structures (GFS). The approach developed by this paper consists in deriving MDS matrices from the product ...
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism
MILP Generalized Feistel structure Switching mechanism
font style='font-size:12px;'>
2018/8/16
Some features of Feistel structures have caused them to be considered as an efficient structure for design of block ciphers. Although several structures are proposed relied on Feistel structure, the t...
Quantum Attacks on Some Feistel Block Ciphers
Quantum key-recovery attack Symmetric cipher
font style='font-size:12px;'>
2018/5/28
Post-quantum cryptography has attracted much attention from worldwide cryptologists. However, most research works are related to public-key cryptosystem due to Shor's attack on RSA and ECC ciphers. At...
Generic Round-Function Recovery for Feistel Networks over Small Domains
feistel networks format-preserving encryption
font style='font-size:12px;'>
2018/1/31
Feistel Networks (FN) are now massively being used to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions,...
Quantum Cryptanalysis on Some Generalized Feistel Schemes
Generalized Feistel Schemes Simon Grover
font style='font-size:12px;'>
2018/1/2
Post-quantum cryptography has attracted much attention from worldwide cryptologists. In ISIT 2010, Kuwakado and Morii gave a quantum distinguisher with polynomial time against 3-round Feistel networks...
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions
Feistel network Grover's algorithm claw finding algorithm
font style='font-size:12px;'>
2017/12/25
This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most power...
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Generalized Feistel Network Differential Analysis Chosen Ciphertext Attack
font style='font-size:12px;'>
2017/12/19
Nachef et al used differential cryptanalysis to study four types of Generalized Feistel Scheme (GFS). They gave the lower bound of maximum number of rounds that is indistinguishable from a random perm...
Quantum Key-recovery Attack on Feistel Structures
Quantum-CPA Key-recovery Attack Feistel Structure
font style='font-size:12px;'>
2017/12/19
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. ...