军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 Key-Recovery Attack相关记录19条 . 查询时间(0.078 秒)
At CRYPTO 2018, we proposed a method to reduce the Boolean polynomial of 855-round Trivium. By multiplying a polynomial reduction factor, the output Boolean polynomial is simplified. Based on this met...
A Key-recovery Attack on 855-round Trivium     Trivium  Nullification Technique  Polynomial Reduction       font style='font-size:12px;'> 2018/3/5
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the solution of the s...
Quantum Key-recovery Attack on Feistel Structures     Quantum-CPA  Key-recovery Attack  Feistel Structure       font style='font-size:12px;'> 2017/12/19
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. ...
Practical Key Recovery Attack on MANTIS-5     cryptanalysis  MANTIS  PRINCE-like ciphers       font style='font-size:12px;'> 2016/12/10
We present a key-recovery attack against MANTIS-5 with 228228 chosen plaintexts and a computational complexity of about 238238 block cipher calls, which violates this claim. Our attack is based on a f...
Faster Key Recovery Attack on Round-Reduced PRINCE     PRINCE  Lightweight  Block cipher       font style='font-size:12px;'> 2016/12/10
We introduce a new technique for doing the key recovery part of an integral or higher order differential attack. This technique speeds up the key recovery phase significantly and can be applied to a...
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community, including several larger projects and a standardization effort from NIST....
Key Recovery Attack against 2.5-round pi-Cipher     CAESAR  secret-key cryptography       font style='font-size:12px;'> 2016/5/24
In this paper, we propose a guess and determine attack against some variants of the π-Cipher family of authenticated ciphers. This family of ciphers is a second-round candidate of the CAESAR comp...
A realtime key recovery attack on the authenticated cipher FASER128     CAESAR  stream ciphers  FASER128       font style='font-size:12px;'> 2016/1/23
FASER is a family of authenticated ciphers submitted to the CAESAR competition, which contains two parent ciphers: FASER128 and FASER256. In this work we only focus on FASER128 and present a key re...
One of the interesting types of RFID application is RFID searching which aims to hear a specific RFID tag from a large group of tags, i.e. ability of detecting whether a target RFID tag is nearby. Ver...
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems     MQ cryptography  MQQ cryptosystems  Equivalent keys       font style='font-size:12px;'> 2016/1/6
We investigate the security of the family of MQQ public key cryptosystems using multivariate quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties. In particul...
In this paper we present a key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme proposed by Bos et al~\cite{NTRUbasedFHE} in 2013. The attack allows us to compu...
Generic Key Recovery Attack on Feistel Scheme     block cipher  key scheduling function  all-subkeys-recovery attack       font style='font-size:12px;'> 2015/12/30
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is based on the all subkeys recovery approach presented in SAC 2012, which determines all subkeys inste...
We present a cryptanalysis of the ASASA public key cipher introduced at Asiacrypt 2014. This scheme alternates three layers of affine transformations A with two layers of quadratic substitutions S. We...
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2     Stream Cipher  Key Recovery  RFID       font style='font-size:12px;'> 2012/3/28
In this letter we report on an ultra-efficient key recovery attack under the chosen-plaintext-attack model against the stream cipher A2U2, which is the most lightweight cryptographic primitive (i.e., ...
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2     Stream Cipher  ey Recovery  FID       font style='font-size:12px;'> 2011/6/9
In this letter we report on an ultra-efficient key recovery attack under the chosen-plaintext-attack model against the stream cipher A2U2, which is the most lightweight cryptographic primitive (i.e., ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...