搜索结果: 1-15 共查到“军事学 Block Cipher”相关记录101条 . 查询时间(0.093 秒)
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Leakage-resilience authenticated encryption leveled implementation
font style='font-size:12px;'>
2019/5/9
This paper presents CONCRETE (Commit-Encrypt-Send-the-Key) a new Authenticated Encryption mode that offers CIML2 security, that is, ciphertext integrity in the presence of nonce misuse and side-channe...
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
tweakable block cipher GIFT AES
font style='font-size:12px;'>
2019/5/5
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) bet...
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
CRAFT block cipher tweakable
font style='font-size:12px;'>
2019/2/28
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryp...
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
n-bit security beyond birthday bound tweakable blockcipher
font style='font-size:12px;'>
2018/11/19
Strong Pseudo-random Permutations (SPRPs) are important for various applications. In general, it is desirable to base an SPRP on a single-keyed primitive for minimizing the implementation costs. For c...
Block Cipher Invariants as Eigenvectors of Correlation Matrices
invariant subspace attack nonlinear invariant attack linear cryptanalysis
font style='font-size:12px;'>
2018/8/21
A new approach to invariant subspaces and nonlinear invariants is developed. This results in both theoretical insights and practical attacks on block ciphers. It is shown that, with minor modification...
Cryptanalysis of SFN Block Cipher
Lightweight block cipher SFN Related key differential cryptanalysis
font style='font-size:12px;'>
2018/6/13
SFN is a lightweight block cipher designed to be compact in hardware environment and also efficient in software platforms. Compared to the conventional block ciphers that are either Feistel or Substit...
Systematization Of A 256-Bit Lightweight Block Cipher Marvin
Lightweight Cryptography Block ciphers LS Designs
font style='font-size:12px;'>
2018/1/19
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be se...
Improvements for Finding Impossible Differentials of Block Cipher Structures
block cipher cryptanalysis impossible differential
font style='font-size:12px;'>
2017/12/19
In this paper we improve Wu and Wang's method for finding impossible differentials of block cipher structures. This improvement is more general than Wu and Wang's method that it can find more impossib...
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
modes of operation key derivation nonce-misuse resistance
font style='font-size:12px;'>
2017/7/24
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
message authentication code tweakable block cipher authenticated encryption
font style='font-size:12px;'>
2017/6/8
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with n-bit ...
New Linear Attacks on Block Cipher GOST
block cipher GOST Feistel network
font style='font-size:12px;'>
2017/6/1
Defined in the standard GOST 28147-89, GOST is a Soviet and Russian government standard symmetric-key block cipher. GOST has the 64-bit block size and a key length of 256 bits. It is a Feistel network...
Meet-in-the-Middle Attack on QARMA Block Cipher
QARMA Lightweight Tweakable Block Cipher Meet-in-the-Middle Attack
font style='font-size:12px;'>
2016/12/29
QARMA is a recently published lightweight tweakable block cipher, which has been used by the ARMv8 architecture to support a software protection feature. In this paper, using the method of MITM, we gi...
ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security
WSN lightweight block cipher DDT
font style='font-size:12px;'>
2016/12/12
In this paper, we analyzed an extreme case of lightweight block cipher design in terms of security and efficiency. To do this, we proposed ELiF block cipher family which has one of the smallest hardwa...
MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher
MILP-aided bit-based division property HIGHT LEA
font style='font-size:12px;'>
2016/12/7
The huge time and memory complexities of utilizing bit-based division property, which was first presented by Todo and Morri at FSE 2016, bothered cryptographers for quite some time and it had been sol...
Cryptanalysis of Reduced round SKINNY Block Cipher
SKINNY Zero-correlation linear cryptanalysis Related-tweakey impossible differential cryptanalysis
font style='font-size:12px;'>
2016/12/7
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and related-tweake impossib...