搜索结果: 1-7 共查到“军事学 TRAIL”相关记录7条 . 查询时间(0.038 秒)
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Boomerang connectivity table GIFT Automatic search
font style='font-size:12px;'>
2019/6/10
In Eurocrypt 2018, Cid et al. proposed a novel notion called the boomerang connectivity table, which formalised the switch property in the middle round of boomerang distinguishers in a unified approac...
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers
STP Differential trail Linear trail
font style='font-size:12px;'>
2019/1/16
Automatic tools have played an important role in designing new cryptographic primitives and evaluating the security of ciphers. Simple Theorem Prover constraint solver (STP) has been used to search fo...
New techniques for trail bounds and application to differential trails in Keccak
differential cryptanalysis trail weight bounds
font style='font-size:12px;'>
2017/2/28
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as...
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
ARX structure Differential trails Automatic search algorithm
font style='font-size:12px;'>
2017/2/20
In this paper, we suggest an advanced method searching for differential trails of block cipher with ARX structure. We
use two techniques to optimize the automatic search algorithm of differential tra...
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
PRINCE Subspace Trails Cryptanalysis Invariant Subspace Attack
font style='font-size:12px;'>
2016/12/8
Subspace trail cryptanalysis is a very recent new cryptanalysis
technique, and includes differential, truncated differential, impossible
differential, and integral attacks as special cases.
Subspace Trail Cryptanalysis and its Applications to AES
Block cipher AES Invariant Subspace Attack
font style='font-size:12px;'>
2016/6/8
We introduce subspace trail cryptanalysis, a generalization
of invariant subspace cryptanalysis. With this more generic treatment of
subspaces we do no longer rely on specific choices of round const...
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
Data confidentiality multi-tenancy audit-trail log
font style='font-size:12px;'>
2015/12/18
Cloud computing is delivery of services rather
than a product and among different cloud deployment models,
the public cloud provides improved scalability and cost reduction
when compared to others....