搜索结果: 1-13 共查到“军事学 O IV”相关记录13条 . 查询时间(0.14 秒)
A Note on Stream Ciphers that Continuously Use the IV
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
font style='font-size:12px;'>
2017/12/6
Time-memory-data tradeoff (TMD-TO) attacks limit the security level of many classical stream ciphers (like E0E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underly...
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
chosen IV attack distinguishing attack statistical attack
font style='font-size:12px;'>
2017/11/20
We propose a new attack framework based upon cube testers and d-monomial tests. The d-monomial test is a general framework for comparing the ANF of the symmetric cipher’s output with ANF of a random B...
Fault analysis and weak key-IV attack on Sprout
Boolean function Sprout Fault attack
font style='font-size:12px;'>
2016/2/26
Armknecht and Mikhalev proposed a new stream cipher ‘Sprout’ based on the design
specification of the stream cipher, Grain-128a. Sprout has shorter state size than Grain family with
a round key func...
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
stream cipher Sprout distinguishing attack
font style='font-size:12px;'>
2016/1/3
Sprout is a new lightweight stream cipher proposed at FSE 2015. According to its designers, Sprout can resist time-memory-data trade-off (TMDTO) attacks with small internal state size. However, we fin...
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa
Stream Cipher ChaCha Salsa
font style='font-size:12px;'>
2015/12/25
Recently, ChaCha20 (the stream cipher ChaCha with 20 rounds) is in the process of
being a standard and thus it attracts serious interest in cryptanalysis. The most significant effort
to analyse Sals...
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Key Correlation Plaintext Recovery
font style='font-size:12px;'>
2014/3/11
The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 ...
Generic related-key and induced chosen IV attacks using the method of key differentiation
Stream ciphers Cryptanalysis
font style='font-size:12px;'>
2014/3/10
Related-key and chosen IV attacks are well known cryptanalytic tools in cryptanalysis of stream ciphers. Though the related-key model is considered to be much more unrealistic scenario than the chosen...
Tweakable Enciphering Schemes From Stream Ciphers With IV
stream cipher with IV tweakable encryption disk encryption
font style='font-size:12px;'>
2009/7/14
We present the first construction of a tweakable enciphering scheme from a stream cipher
supporting an initialization vector. This construction can take advantage of the recent advances in
hardware ...
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
cryptanalysis equivalent keys stream cipher DECIM v2
font style='font-size:12px;'>
2009/6/3
DECIM v2 is a stream cipher submitted to the ECRYPT
stream cipher project (eSTREAM) and ISO/IEC 18033-4. No attack
against DECIM v2 has been proposed yet. In this paper, we propose a
chosen IV atta...
Breaking One.Fivium by AIDA an Algebraic IV Differential Attack
estream Algebraic IV differential attack AIDA
font style='font-size:12px;'>
2008/5/23
We show, how to break Trivium with a setup of 576 (instead
of 1152) clock cycles, with an e®ort of 26 chosen IV resynchronisations up
to cycle 625 for each of the 47 recovered key bits.
“宝石路”IV完成最后试验
“宝石路”IV 雷声公司 英国奎奈蒂克公司
font style='font-size:12px;'>
2006/12/15
[英国《简氏防务周刊》2006年12月13日刊报道] 雷声公司研发的“宝石路”IV INS/GPS精确制导炸弹项目已经完成了最后的发射试验。2006年11月中旬,在英国奎奈蒂克公司位于威尔士的阿博珀斯试验场,英国皇家空军的“鹞”GR.9攻击机投放了“宝石路”IV炸弹。
雷声公司成功完成“宝石路”IV炸弹的投放试验
雷声公司 “宝石路”IV炸弹
font style='font-size:12px;'>
2006/7/28
[美国《防务日报》2006年7月17日报道] 据雷声公司报道,在英国威尔士的Aberporth靶场,英国皇家空军的“鹞”式GR9战斗机成功投放了雷声公司研制的“宝石路”IV双模精确制导武器。在本次试验当中,武器按要求命中了指定目标。“宝石路”IV炸弹是“宝石路”弹族中的最新型精确制导弹药,由雷声系统(英国)有限公司和美国雷声导弹系统公司联合研制。
英国订购“战斧”Block IV巡航导弹
Block IV巡航导弹 英国 美国雷声公司
font style='font-size:12px;'>
2006/2/16
[法国《防务宇航》2006年2月10日报道] 日前,美国雷声公司与英国签订了一份价值1410万美元的修订合同,修订双方签订的“战斧”战术巡航导弹全备弹批量生产合同。英国需要65枚鱼雷管发射“战斧”Block IV导弹替代先前订购的65枚潜艇垂直发射“战斧”Block III导弹。因此,英国将向雷声公司追加资金,以支付65枚鱼雷管发射“战斧”Block IV战术导弹的相关生产工作增加的材料及劳动力费...