军事学 >>> 军事学
搜索结果: 1-13 共查到军事学 O IV相关记录13条 . 查询时间(0.14 秒)
Time-memory-data tradeoff (TMD-TO) attacks limit the security level of many classical stream ciphers (like E0E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underly...
We propose a new attack framework based upon cube testers and d-monomial tests. The d-monomial test is a general framework for comparing the ANF of the symmetric cipher’s output with ANF of a random B...
Fault analysis and weak key-IV attack on Sprout     Boolean function  Sprout  Fault attack       font style='font-size:12px;'> 2016/2/26
Armknecht and Mikhalev proposed a new stream cipher ‘Sprout’ based on the design specification of the stream cipher, Grain-128a. Sprout has shorter state size than Grain family with a round key func...
Sprout is a new lightweight stream cipher proposed at FSE 2015. According to its designers, Sprout can resist time-memory-data trade-off (TMDTO) attacks with small internal state size. However, we fin...
Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa     Stream Cipher  ChaCha  Salsa       font style='font-size:12px;'> 2015/12/25
Recently, ChaCha20 (the stream cipher ChaCha with 20 rounds) is in the process of being a standard and thus it attracts serious interest in cryptanalysis. The most significant effort to analyse Sals...
The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 ...
Related-key and chosen IV attacks are well known cryptanalytic tools in cryptanalysis of stream ciphers. Though the related-key model is considered to be much more unrealistic scenario than the chosen...
We present the first construction of a tweakable enciphering scheme from a stream cipher supporting an initialization vector. This construction can take advantage of the recent advances in hardware ...
DECIM v2 is a stream cipher submitted to the ECRYPT stream cipher project (eSTREAM) and ISO/IEC 18033-4. No attack against DECIM v2 has been proposed yet. In this paper, we propose a chosen IV atta...
Breaking One.Fivium by AIDA an Algebraic IV Differential Attack     estream  Algebraic IV differential attack  AIDA       font style='font-size:12px;'> 2008/5/23
We show, how to break Trivium with a setup of 576 (instead of 1152) clock cycles, with an e®ort of 26 chosen IV resynchronisations up to cycle 625 for each of the 47 recovered key bits.
“宝石路”IV完成最后试验     “宝石路”IV  雷声公司  英国奎奈蒂克公司       font style='font-size:12px;'> 2006/12/15
[英国《简氏防务周刊》2006年12月13日刊报道] 雷声公司研发的“宝石路”IV INS/GPS精确制导炸弹项目已经完成了最后的发射试验。2006年11月中旬,在英国奎奈蒂克公司位于威尔士的阿博珀斯试验场,英国皇家空军的“鹞”GR.9攻击机投放了“宝石路”IV炸弹。
雷声公司成功完成“宝石路”IV炸弹的投放试验     雷声公司  “宝石路”IV炸弹       font style='font-size:12px;'> 2006/7/28
[美国《防务日报》2006年7月17日报道] 据雷声公司报道,在英国威尔士的Aberporth靶场,英国皇家空军的“鹞”式GR9战斗机成功投放了雷声公司研制的“宝石路”IV双模精确制导武器。在本次试验当中,武器按要求命中了指定目标。“宝石路”IV炸弹是“宝石路”弹族中的最新型精确制导弹药,由雷声系统(英国)有限公司和美国雷声导弹系统公司联合研制。
英国订购“战斧”Block IV巡航导弹     Block IV巡航导弹  英国  美国雷声公司       font style='font-size:12px;'> 2006/2/16
[法国《防务宇航》2006年2月10日报道] 日前,美国雷声公司与英国签订了一份价值1410万美元的修订合同,修订双方签订的“战斧”战术巡航导弹全备弹批量生产合同。英国需要65枚鱼雷管发射“战斧”Block IV导弹替代先前订购的65枚潜艇垂直发射“战斧”Block III导弹。因此,英国将向雷声公司追加资金,以支付65枚鱼雷管发射“战斧”Block IV战术导弹的相关生产工作增加的材料及劳动力费...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...