搜索结果: 1-15 共查到“军事学 aes”相关记录200条 . 查询时间(0.125 秒)
SPAE a mode of operation for AES on low-cost hardware
secret-key cryptography AES block ciphers
font style='font-size:12px;'>
2019/9/16
We propose SPAE, a single pass, patent free, authenticated encryption with associated data (AEAD) for AES. The algorithm has been developped to address the needs of a growing trend in IoT systems: sto...
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
SPN AES Exchange Attack
font style='font-size:12px;'>
2019/8/20
In this paper, we study the results of the recently proposed exchange attack in an adaptive setting. As expected, it leads to present a better 6-round key-independent distinguisher in terms of data an...
Weak-Key Subspace Trails and Applications to AES
AES Key Schedule Weak-Keys
font style='font-size:12px;'>
2019/7/24
Invariant subspaces (Crypto'11) and subspace trails (FSE'17) are two related recent cryptanalytic approaches that led to new results on, e. g. PRINTCipher and AES. We extend the invariant subspace app...
Reducing the Cost of Implementing AES as a Quantum Circuit
quantum cryptanalysis quantum circuit Grover’s algorithm AES
font style='font-size:12px;'>
2019/7/24
To quantify security levels in a post-quantum scenario, it is common to use the quantum resources needed to attack AES as a reference value. Specifically, in NIST’s ongoing post-quantum standardizatio...
AES MixColumn with 94 XOR gates
AES MixColumn Short Linear Program
font style='font-size:12px;'>
2019/7/22
In this short report we present a short linear program for AES MixColumn with 94 XOR gates.
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
AES SBox circuit area circuit depth
font style='font-size:12px;'>
2019/7/15
In this paper we consider various methods and techniques to find the smallest circuit realizing a given linear transformation on nn input signals and mm output signals, with a constraint of a maximum ...
BBQ: Using AES in Picnic Signatures
public-key cryptography AES
font style='font-size:12px;'>
2019/7/10
This works studies the use of the AES block-cipher for Picnic-style signatures, which work in the multiparty-computation-in-the-head model. It applies advancements to arithmetic circuits for the compu...
Dissecting the CHES 2018 AES Challenge
AES CTF
font style='font-size:12px;'>
2019/7/10
One challenge of the CHES 2018 side channel contest was to break a masked AES implementation. It was impressively won by Gohr et al. by applying ridge regression to obtain guesses for the hamming weig...
Practical Attacks on Reduced-Round AES
AES Zero-difference Secret-key distinguisher
font style='font-size:12px;'>
2019/7/8
In this paper we investigate the security of 5-round AES against two different attacks in an adaptive setting. We present a practical key-recovery attack on 5-round AES with a secret s-box that requir...
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
AES Mixture Differential Cryptanalysis Secret-Key Distinguisher
font style='font-size:12px;'>
2019/7/8
The starting point of our work is “Mixture Differential Cryptanalysis” recently introduced at FSE/ToSC 2019, a way to turn the “multiple-of-8” 5-round AES secret-key distinguisher presented at Eurocry...
Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4
Tower field Inverter S-box
font style='font-size:12px;'>
2019/6/24
The tower field implementation of the F28F28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardized block ciphers such as AES, Camell...
The Exchange Attack: How to Distinguish 6 Rounds of AES with $2^{88.2}$ chosen plaintexts
SPN AES Exchange Equivalence Attacks
font style='font-size:12px;'>
2019/6/5
In this paper we present exchange equivalence attacks which is a cryptanalytic attack technique suitable for SPN-like block cipher designs. Our new technique results in a secret-key chosen plaintext d...
Extended Expectation Cryptanalysis on Round-reduced AES
cryptanalysis block cipher AES
font style='font-size:12px;'>
2019/6/4
Distinguishers on round-reduced AES have attracted considerable attention in the recent years. Although the number of rounds covered in key-recovery attacks has not been increased since, subspace, yoy...
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
AES MITM preimage
font style='font-size:12px;'>
2019/6/3
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011 introduced the first preim...
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Advanced Encryption Standard AES AES-192
font style='font-size:12px;'>
2019/4/3
Concerning the side-channel attacks on Advanced Encryp- tion Standard, it seems that majority of studies focus on the lowest size: AES-128. Even when adaptable to higher sizes (AES-192 and AES-256), l...