军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 Cube attack相关记录24条 . 查询时间(0.125 秒)
New Conditional Cube Attack on Keccak Keyed Modes     Conditional Cube Attack  Keccak  KMAC       font style='font-size:12px;'> 2019/4/22
Conditional cube attack on round-reduced \textsc{Keccak} keyed modes was proposed by Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was introduced, whose diffusion was si...
A Practical Method to Recover Exact Superpoly in Cube Attack     Trivium  MILP  Cube attack       font style='font-size:12px;'> 2019/3/6
Cube attack is an important cryptanalytic technique against symmetric cryptosystems, especially for stream ciphers. The key step in cube attack is recovering superpoly. However, when cube size is larg...
Frit is a new lightweight 384-bit cryptographic permutation proposed by Simon et al., which is designed for resisting fault injection and performs competitively in both hardware and software. Dobrauni...
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP     Ketje  Xoodoo  Keccak-MAC       font style='font-size:12px;'> 2018/11/19
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 2015. It recovers the key through two phases: the preprocessing phase for precomputing a look-up table ...
Recently, another kind of dynamic cube attack is proposed by Fu et al. With some key guesses and a transformation in the output bit, they claim that, when the key guesses are correct, the degree of th...
SMT-based Cube Attack on Simeck32/64     SMT-based Attack  Cube Attack  Algebraic Attack       font style='font-size:12px;'> 2018/2/6
Satisfiability modulo theories or SMT can be stated as a generalization of Boolean satisfiability problem or SAT. The core idea behind the introduction of SMT solvers is to reduce the complexity throu...
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes     Keccak-MAC  Ketje  MILP       font style='font-size:12px;'> 2018/1/19
Cube-attack-like cryptanalysis was proposed by Dinur et al. at EUROCRYPT 2015, which recovers the key of Keccak keyed modes in a divide-and-conquer manner. In their attack, one selects cube variables ...
Cube Attack against Full Kravatte     Kravatte  Cube Attack  Keccak       font style='font-size:12px;'> 2017/10/25
This note analyzes the security of Kravatte against the cube attack. We provide an analysis result which recovers the master key of the current version of full Kravatte with data and time complexities...
Conditional Cube Attack on Round-Reduced River Keyak     secret-key encryption  round-reduced River Keyak       font style='font-size:12px;'> 2017/10/19
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak is the only lightweight scheme of the Keccak-permutation-based Authenticated Encryption Cipher Keya...
Conditional Cube Attack on Round-Reduced ASCON     secret-key cryptography  Keyak       font style='font-size:12px;'> 2017/2/24
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cu...
Conditional Cube Attack on Reduced-Round Keccak Sponge Function     Keccak-MAC  Keyak  cube tester       font style='font-size:12px;'> 2016/12/10
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable...
A Dynamic Cube Attack on $105$ round Grain v1     eStream  Differential Cryptanalysis  Dynamic Cube Attack       font style='font-size:12px;'> 2016/1/7
As far as the Differential Cryptanalysis of reduced round Grain v1 is concerned, the best results were those published by Knellwolf et al. in Asiacrypt 2011. In an extended version of the paper, it ...
In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of ...
A little work has ever been performed in cryptanalysis of block ciphers using cube technique. This paper presents a new framework for an efficient key recovery attack on block ciphers using a kind o...
Applications of Key Recovery Cube-attack-like     Cryptanalysis  Cube Attacks  Hash Functions,       font style='font-size:12px;'> 2015/12/22
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Phase, where complexity can be calculated without running the actual experiments and random-like sea...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...