搜索结果: 1-5 共查到“军事学 Ascon”相关记录5条 . 查询时间(0.031 秒)
Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software
ACORN Ascon DPA
font style='font-size:12px;'>
2018/8/2
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM for several use-cases, including lightweight applications. ACORN and Ascon are the tw...
Conditional Cube Attack on Round-Reduced ASCON
secret-key cryptography Keyak
font style='font-size:12px;'>
2017/2/24
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cu...
Truncated, Impossible, and Improbable Differential Analysis of Ascon
Ascon Truncated Differential Impossible Differential
font style='font-size:12px;'>
2016/5/23
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition
for Authenticated Encryption: Security, Applicability, and Robustness. So far, succe...
Cryptanalysis of Ascon
authenticated encryption cryptanalysis CAESAR initiative
font style='font-size:12px;'>
2016/1/5
We present a detailed security analysis of the CAESAR candidate
Ascon. Amongst others, cube-like, differential and linear cryptanalysis
are used to evaluate the security of Ascon. Our results are
p...
Suit up! Made-to-Measure Hardware Implementations of Ascon
Authenticated encryption CAESAR competition hardware design
font style='font-size:12px;'>
2016/1/5
Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of the CAESAR authenticated encryption competition. In this paper...