搜索结果: 1-15 共查到“军事学 Key-Recovery Attack”相关记录19条 . 查询时间(0.078 秒)
A Refinement of “A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
Trivium Nullification Technique Polynomial Reduction
font style='font-size:12px;'>
2018/11/5
At CRYPTO 2018, we proposed a method to reduce the Boolean polynomial of 855-round Trivium. By multiplying a polynomial reduction factor, the output Boolean polynomial is simplified. Based on this met...
A Key-recovery Attack on 855-round Trivium
Trivium Nullification Technique Polynomial Reduction
font style='font-size:12px;'>
2018/3/5
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the solution of the s...
Quantum Key-recovery Attack on Feistel Structures
Quantum-CPA Key-recovery Attack Feistel Structure
font style='font-size:12px;'>
2017/12/19
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. ...
Practical Key Recovery Attack on MANTIS-5
cryptanalysis MANTIS PRINCE-like ciphers
font style='font-size:12px;'>
2016/12/10
We present a key-recovery attack against MANTIS-5 with 228228 chosen plaintexts and a computational complexity of about 238238 block cipher calls, which violates this claim. Our attack is based on a f...
Faster Key Recovery Attack on Round-Reduced PRINCE
PRINCE Lightweight Block cipher
font style='font-size:12px;'>
2016/12/10
We introduce a new technique for doing the key recovery part
of an integral or higher order differential attack. This technique speeds
up the key recovery phase significantly and can be applied to a...
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
CCA-security key-recovery attack post-quantum cryptography
font style='font-size:12px;'>
2016/12/10
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community, including several larger projects and a standardization effort from NIST....
Key Recovery Attack against 2.5-round pi-Cipher
CAESAR secret-key cryptography
font style='font-size:12px;'>
2016/5/24
In this paper, we propose a guess and determine attack against some variants of the π-Cipher family of authenticated ciphers. This family of ciphers is a second-round candidate of the CAESAR comp...
A realtime key recovery attack on the authenticated cipher FASER128
CAESAR stream ciphers FASER128
font style='font-size:12px;'>
2016/1/23
FASER is a family of authenticated ciphers submitted to the CAESAR competition, which contains two parent ciphers: FASER128 and FASER256. In this work we only focus on FASER128 and present a key re...
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Authentication error correcting coding lightweight
font style='font-size:12px;'>
2016/1/9
One of the interesting types of RFID application is RFID searching which aims to hear a specific RFID tag from a large group of tags, i.e. ability of detecting whether a target RFID tag is nearby. Ver...
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
MQ cryptography MQQ cryptosystems Equivalent keys
font style='font-size:12px;'>
2016/1/6
We investigate the security of the family of MQQ public key cryptosystems using multivariate
quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties.
In particul...
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
key recovery attack private key
font style='font-size:12px;'>
2016/1/6
In this paper we present a key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme proposed by Bos et al~\cite{NTRUbasedFHE} in 2013. The attack allows us to compu...
Generic Key Recovery Attack on Feistel Scheme
block cipher key scheduling function all-subkeys-recovery attack
font style='font-size:12px;'>
2015/12/30
We propose new generic key recovery attacks on Feistel-type block ciphers. The
proposed attack is based on the all subkeys recovery approach presented in SAC 2012, which
determines all subkeys inste...
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
multivariate cryptography polynomials cryptanalysis
font style='font-size:12px;'>
2015/12/29
We present a cryptanalysis of the ASASA public key cipher introduced at Asiacrypt 2014. This scheme alternates three layers of affine transformations A with two layers of quadratic substitutions S. We...
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
Stream Cipher Key Recovery RFID
font style='font-size:12px;'>
2012/3/28
In this letter we report on an ultra-efficient key recovery attack under the chosen-plaintext-attack model against the stream cipher A2U2, which is the most lightweight cryptographic primitive (i.e., ...
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
Stream Cipher ey Recovery FID
font style='font-size:12px;'>
2011/6/9
In this letter we report on an ultra-efficient key recovery attack under the chosen-plaintext-attack model against the stream cipher A2U2, which is the most lightweight cryptographic primitive (i.e., ...