搜索结果: 1-15 共查到“军事学 Related-key”相关记录55条 . 查询时间(0.078 秒)
Related-Key Differential Slide Attack Against Fountain V1
lightweight cryptography Fountain slide attacks
font style='font-size:12px;'>
2019/8/14
The stream cipher FOUNTAIN was introduced in April 2019 as one of the candidates in the NIST lightweight crypto standardization process. In this paper we introduce a slide attack that leads to the con...
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule
Key Recovery Rectangle Attack SKINNY
font style='font-size:12px;'>
2019/6/19
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers ...
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Boomerang connectivity table GIFT Automatic search
font style='font-size:12px;'>
2019/6/10
In Eurocrypt 2018, Cid et al. proposed a novel notion called the boomerang connectivity table, which formalised the switch property in the middle round of boomerang distinguishers in a unified approac...
Related-Key Linear Cryptanalysis on SIMON
related-key attack linear cryptanalysis linear key schedule
font style='font-size:12px;'>
2018/3/7
We present a general framework of the related-key linear attack that can be applied to a class of block ciphers including the key-alternating iterative ones with linear or affine key schedules. In con...
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Non-malleable code split-state tampering model related-key security
font style='font-size:12px;'>
2018/3/5
A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original message, or in an unrelated message.
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
font style='font-size:12px;'>
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Tweakable Even-Mansour almost-XOR-universal hash functions multi-key attack
font style='font-size:12px;'>
2016/12/29
Cogliati et al. introduced the tweakable Even-Mansour cipher constructed from a single permutation and an almost-XOR-universal (AXU) family of hash functions with tweak and key schedule. Most of previ...
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Symmetric cryptography cryptanalysis tweakable block cipher
font style='font-size:12px;'>
2016/12/7
At CRYPTO'16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with SIMON. SKINNY can be implemented efficiently in both soft- and hardware, possess...
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher
Iterated Even-Mansour cipher related-key attack
font style='font-size:12px;'>
2016/7/20
We prove the related-key security of the Iterated Even-Mansour cipher under broad classes of related key derivation (RKD) functions. Our result extends the classes of RKD functions considered by Farsh...
Human-readable Proof of the Related-Key Security of AES-128
AES related-key differential attack security proof
font style='font-size:12px;'>
2016/1/27
The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced efficient compute...
The Related-Key Analysis of Feistel Constructions
Feistel construction Luby–Rackoff Related-key attack
font style='font-size:12px;'>
2016/1/26
It is well known that the classical three- and four-round Feistel constructions are provably
secure under chosen-plaintext and chosen-ciphertext attacks, respectively. However, irrespective of the
n...
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Related-key Attacks pseudo-randomness
font style='font-size:12px;'>
2016/1/9
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking the primitive with several secret keys which satisfy some known relation. The task of constructing pr...
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Related-Key Security Pseudorandom Functions
font style='font-size:12px;'>
2016/1/9
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where the key can be manipulated by the adversary. In the RKA setting, the adversary's power is expressed t...
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Automatic cryptanalysis Related-key differential cryptanalysis Linear cryptanalysis
font style='font-size:12px;'>
2016/1/7
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of
the differential and linear behavior of a wide range of block ciphers. We point out that the differential
behav...
The Related-Key Security of Iterated Even-Mansour Ciphers
Even–Mansour related-key attack public permutation
font style='font-size:12px;'>
2016/1/5
The simplicity and widespread use of blockciphers based on the iterated Even–Mansour (EM)
construction has sparked recent interest in the theoretical study of their security. Previous work has
estab...