搜索结果: 1-10 共查到“军事学 related-key attacks”相关记录10条 . 查询时间(0.093 秒)
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks
Tweakable Even-Mansour almost-XOR-universal hash functions multi-key attack
font style='font-size:12px;'>
2016/12/29
Cogliati et al. introduced the tweakable Even-Mansour cipher constructed from a single permutation and an almost-XOR-universal (AXU) family of hash functions with tweak and key schedule. Most of previ...
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks
Related-key attacks Schnorr signatures DSA
font style='font-size:12px;'>
2015/12/21
In the ordinary security model for signature schemes, we consider an adversary that may
forge a signature on a new message using only his knowledge of other valid message and signature
pairs. To tak...
A note on quantum related-key attacks
quantum computing related-key attack
font style='font-size:12px;'>
2014/3/12
In a basic related-key attack against a block cipher, the adversary has access to encryptions under keys that differ from the target key by bit-flips. In this short note we show that for a quantum adv...
Message Authentication Codes Secure against Additively Related-Key Attacks
message authentication code related-key attack
font style='font-size:12px;'>
2013/4/18
Message Authentication Code (MAC) is one of most basic primitives in cryptography. After Biham (EUROCRYPT 1993) and Knudsen (AUSCRYPT 1992) proposed related-key attacks (RKAs), RKAs have damaged MAC's...
Related-key Attacks Against Full Hummingbird-2
Hummingbird-2 Related-Key Cryptanalysis Lightweight Cryptography Authenticated Encryption
font style='font-size:12px;'>
2013/4/18
We present attacks on full Hummingbird-2 which are able to recover the 128-bit secret keys of two black box cipher instances that have a certain type of low-weight XOR difference in their keys. We cal...
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
secret-key cryptography / cryptanalysis related key block cipher key schedule lightweight cipher key-recovery
font style='font-size:12px;'>
2012/3/29
Cryptography Secure Against Related-Key Attacks and Tampering
Related-key attack tamper-resistance pseudorandom functions signatures identity-based encryption
font style='font-size:12px;'>
2012/3/28
We show how to leverage the RKA (Related-Key Attack) security of blockciphers to provide RKA security for a suite of high-level primitives. This motivates a more general theoretical question, namely, ...
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
secret-key cryptography / Related-key attack Ideal-cipher model Blockcipher
font style='font-size:12px;'>
2012/3/28
Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictability and collision-resistance) on ...
Semantic Security Under Related-Key Attacks and Applications
related-key attacks randomized encryption oblivious transfer operation respecting synthesizers correlation-robust hash functions
font style='font-size:12px;'>
2010/10/26
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking the primitive with several secret keys which satisfy some known, or even chosen, relation. We initiat...
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Combined Differential Linear Related-Key Attacks Block Ciphers MAC Algorithms
font style='font-size:12px;'>
2009/1/6
Differential and linear attacks are the most widely used cryptanalytic tools to
evaluate the security of symmetric-key cryptography. Since the introduction of
differential and linear attacks in the ...