搜索结果: 1-6 共查到“军事学 KTANTAN”相关记录6条 . 查询时间(0.046 秒)
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers
block ciphers cryptanalysis implementation
font style='font-size:12px;'>
2018/3/12
This paper investigates the security of the KTANTAN block cipher against differential fault analysis. This attack is considered to be first side channel analysis of KTANTAN in the literature. KTANTAN ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
font style='font-size:12px;'>
2012/6/14
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST, KTANTAN Hummingbird
font style='font-size:12px;'>
2012/3/22
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
font style='font-size:12px;'>
2012/3/21
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
secret-key cryptography / block cipher hash function meet-in-the-middle attack KTANTAN, indirect-partial-matching splice-and-cut
font style='font-size:12px;'>
2012/3/28
We revisit meet-in-the-middle attacks on block ciphers and recent developments in meet-in-the-middle preimage attacks on hash functions. Despite the presence of a secret key in the block cipher case, ...
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
cryptanalysis meet-in-the-middle attacks block cipher key schedule lightweight cipher key-recovery RFID
font style='font-size:12px;'>
2010/10/20
In this paper we describe a variant of existing meet-in-the middle attacks on block ciphers. As an application, we propose meet-in- the-middle attacks that are applicable to the KTANTAN family of bloc...