军事学 >>> 军事学 >>> 军事理论 军事史 军事心理学 战略学 战役学 战术学 军队指挥学 军制学 军队政治工作学 军事后勤学 军事地学 军事技术 军事学其他学科 军事学其他学科
搜索结果: 1-15 共查到军事学 DES相关记录28条 . 查询时间(0.312 秒)
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property     linear cryptanalysis  DES  3DES       font style='font-size:12px;'> 2019/1/2
In this paper we extend the work presented by Ashur and Posteuca in BalkanCryptSec 2018, by designing 0-correlation key-dependent linear trails covering more than one round of DES. First, we design a ...
We present an improved search strategy for a template attack on the secret DES key of a widely-used smart card, which is based on a Common-Criteria certified chip. We use the logarithm of the probabil...
On linear hulls in one round of DES     DES  Linear Cryptanalysis  Linear Hulls       font style='font-size:12px;'> 2018/7/4
At Indocrypt 2016, Ashur et al. showed that linear hulls are sometimes formed in a single round of a cipher (exemplifying on Simon ciphers) and showed that the success rate of an attack may be influen...
A first-order chosen-plaintext DPA attack on the third round of DES     side-channel attack  DPA  countermeasure       font style='font-size:12px;'> 2018/1/2
DPA attacks usually exhibit a "divide-and-conquer" property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially...
Linear Cryptanalysis of DES with Asymmetries     Linear cryptanalysis  DES  mixture models       font style='font-size:12px;'> 2017/9/21
Linear cryptanalysis of DES, proposed by Matsui in 1993, has had a seminal impact on symmetric-key cryptography, having seen massive research efforts over the past two decades. It has spawned many var...
Recently, a new template attack on the DES key scheduling was demonstrated that allows recovery of a sufficiently large portion of the DES key of a widely deployed certified smart card chip using a si...
We present an actively secure protocol for secure multi-party computation based on lookup tables, by extending the recent, two-party `TinyTable' protocol of Damgard et al. (ePrint 2016). Like TinyTabl...
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card     DES  TDES  Template Attack       font style='font-size:12px;'> 2017/2/20
A new template attack on the DES key scheduling is demonstrated that allows recovery of a sufficiently large portion of the DES key of a recent and widely deployed smart card chip with a {\it single} ...
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate singular linear encodings of the output of the individual S-boxes. More specifically, w...
Two open problems on using Matsui’s Algorithm 2 with multiple linear approximations posed earlier by Biryukov, De Canni`ere and M. Quisquater at Crypto’04 are solved in the present paper. That impro...
Statistical and Algebraic Properties of DES     output distributions  linear dependencies  coset representation       font style='font-size:12px;'> 2015/12/24
D. Davies and S. Murphy found that there are at most 660 different probability distributions on the output from any three adjacent S-boxes after 16 rounds of DES [3]. In this paper it is shown that ...
Static Fault Attacks on Hardware DES Registers     Hardware DES  fault attacks  safe-error  register attacks       font style='font-size:12px;'> 2012/3/26
In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit loc...
Logical cryptoanalysis on the example of the cryptosystem DES     block ciphers  DES  Boolean functions       font style='font-size:12px;'> 2010/2/20
In the paper on the example of the cryptosystem DES, the successful method of a cryptanalysis is presented. As a result, it is offered as a criterion of the cryptographic security to use a complexit...
数字电视CAS中DES加密模块的FPGA实现     DES  流水线  循环法       font style='font-size:12px;'> 2009/8/4
一种基于FPGA的数据加密标准算法的实现。就资源优先和性能优先分别使用循环法和流水线法对DES加密算法进行了设计,并对其进行了比较。通过采用子密钥简单产生和ROM优化S盒的方法,对流水线法进行改进,达到了资源占用率低、加密速度快的效果。
How to Launch A Birthday Attack Against DES     DES  Differential cryptanalysis  Linear cryptanalysis       font style='font-size:12px;'> 2009/6/5
We present a birthday attack against DES. It is entirely based on the relationship Li+1 = Ri and the simple key schedule in DES. It requires about 216 ciphertexts of the same R16, encrypted by the s...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...