搜索结果: 1-6 共查到“军事学 FOX”相关记录6条 . 查询时间(0.062 秒)
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
block cipher meet-in-the-middle attack all-subkeys recovery attack
font style='font-size:12px;'>
2015/12/29
The all-subkeys recovery (ASR) attack is an extension of the meet-in-the-middle
attack, which allows evaluating the security of a block cipher without analyzing its key
scheduling function. Combinin...
Improved Fault Attack on FOX
FOX block cipher Lai-Massay scheme fault attack
font style='font-size:12px;'>
2010/4/7
In this paper, based on a di?erential property of two round
Lai-Massay scheme in a fault model, we present an improved fault attack
on the block cipher FOX64. Our improved method can deduce any roun...
IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF FOX
Security cryptography block cipher FOX
font style='font-size:12px;'>
2009/7/22
Block ciphers are the very foundation of computer and information
security. FOX, also known as IDEA NXT, is a family
of block ciphers published in 2004 and is famous for its
provable security to cr...
Improved Integral Cryptanalysis of FOX Block Cipher
Block cipher FOX Data complexity Time complexity
font style='font-size:12px;'>
2009/2/27
FOX is a new family of block ciphers presented recently,
which is based upon some results on proven security and has high per-
formances on various platforms. In this paper, we construct some distin...
FOX Algorithm Implementation: a hardware design approach
FOX Algorithm Implementation hardware design approach
font style='font-size:12px;'>
2009/2/9
Encryption algorithms are becoming
more necessary to ensure data is securely transmitted
over insecure communication channels. FOX is
a recently developed algorithm and its structure is
based on t...
FOX Algorithm Implementation:a hardware design approach
FOX Algorithm Implementation hardware design approach
font style='font-size:12px;'>
2009/2/8
Encryption algorithms are becoming
more necessary to ensure data is securely transmitted
over insecure communication channels. FOX is
a recently developed algorithm and its structure is
based on t...