军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 SIMON相关记录40条 . 查询时间(0.068 秒)
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...
In symmetric cryptanalysis, the model of superposition queries has lead to surprising results, with many constructions being broken in polynomial time thanks to Simon's period-finding algorithm. But t...
A Note on SIMON-$32/64$ Security     Block ciphers  cryptanalysis  zero-knowledge       font style='font-size:12px;'> 2019/5/13
This paper presents the results of a new approach to the cryptanalysis of SIMON-32/6432/64, a cipher published by NSA in 2013. Our cryptanalysis essentially considers combinatorial properties. These p...
Further observations on SIMON and SPECK families of block ciphers     SIMON  SPECK  DDT       font style='font-size:12px;'> 2018/11/20
SIMON and SPECK families of block ciphers are well-known lightweight ciphers designed by NSA. In this note, based on the previous investigations on SIMON, a closed formula for the squared correlations...
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64     Correlated sequences  Simon  Simeck       font style='font-size:12px;'> 2018/8/2
In this paper, we propose a novel cryptanalytic technique called correlated sequence attack on block ciphers. Our attack exploits the properties of given key dependent sequences of length tt to obtain...
Related-Key Linear Cryptanalysis on SIMON     related-key attack  linear cryptanalysis  linear key schedule       font style='font-size:12px;'> 2018/3/7
We present a general framework of the related-key linear attack that can be applied to a class of block ciphers including the key-alternating iterative ones with linear or affine key schedules. In con...
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA     secret-key cryptography  HIGHT       font style='font-size:12px;'> 2018/1/15
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypte...
The Security of SIMON-like Ciphers Against Linear Cryptanalysis     SIMON  SIMECK       font style='font-size:12px;'> 2017/6/22
In the present paper, we analyze the security of SIMON-like ciphers against linear cryptanalysis. First, an upper bound is derived on the squared correlation of SIMON-like round function. It is shown ...
Notes on the design and analysis of SIMON and SPECK     secret-key cryptography  block ciphers       font style='font-size:12px;'> 2017/6/9
We discuss the design rationale and analysis of the SIMON and SPECK lightweight block ciphers.
Using whitening keys is a well understood mean of increasing the key-length of any given cipher. Especially as it is known ever since Grover's seminal work that the effective key-length is reduced by ...
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK     SIMON  SPECK  FPGA       font style='font-size:12px;'> 2017/5/5
A Degenerate Grouping Power Attack (DGPA) is a type of Partitioning Power Analysis (PPA) used to extract secret keys from the power sidechannel signal of an encryption algorithm running on a device al...
Optimal Differential Trails in SIMON-like Ciphers     automatic search  differential trail  SIMON       font style='font-size:12px;'> 2017/2/28
In the present paper, we propose an automatic search algorithm for optimal differential trails in SIMON-like ciphers. First, we give a more accurate upper bound on the differential probability of SIMO...
Pen and Paper Arguments for SIMON and SIMON-like Designs     SIMON  Simeck  differential cryptanalysis       font style='font-size:12px;'> 2016/6/27
In this work, we analyze the resistance of \textsc{Simon}-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a \textsc{Simon...
SIMON is a lightweight block cipher designed by NSA in 2013. NSA presented the specification and the implementation efficiency, but they did not provide detailed security analysis nor the design ratio...
Bit-Based Division Property and Application to Simon Family     secret-key cryptography  cryptanalysis       font style='font-size:12px;'> 2016/3/16
Ciphers that do not use S-boxes have been discussed for the demand on lightweight cryptosystems, and their round functions consist of and, rotation, and xor. Especially, the Simon family is one of t...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...