搜索结果: 1-14 共查到“军事学 multidimensional”相关记录14条 . 查询时间(0.043 秒)
Separable Statistics and Multidimensional Linear Cryptanalysis
block ciphers multidimensional linear cryptanalysis separable statistics
font style='font-size:12px;'>
2017/10/12
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a number of new ideas. Firstly, formulae is given to compute approximate multidimensional distributions o...
A New Functional Encryption for Multidimensional Range Query
Functional Encryption Multidimensional Range Query
font style='font-size:12px;'>
2017/10/9
Functional encryption, which emerges in the community recently, is a generalized concept of traditional encryption (e.g. RSA and AES). In traditional encryption scheme, decrypting a ciphertext with a ...
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
multidimensional linear cryptanalysis multiple linear cryptanalysis chi-squared distribution
font style='font-size:12px;'>
2017/8/1
This work considers statistical analysis of attacks on block ciphers using several linear approximations. A general and unified approach is adopted. To this end, the general key randomisation hypothes...
Constructing Multidimensional Differential Addition Chains and their Applications
differential addition chains side channel resistance elliptic curves
font style='font-size:12px;'>
2017/4/12
We propose new algorithms for constructing multidimensional differential addition chains and for performing multidimensional scalar point multiplication based on these chains. Our algorithms work in a...
Multidimensional Meet in the Middle Cryptanalysis of KATAN
KATAN Multidimensional Meet in the Middle Attack
font style='font-size:12px;'>
2016/2/24
KATAN and KTANTAN are two lightweight families of hardware
oriented block ciphers proposed by Canni`ere et al. at CHES 2009.
They have different versions of 32-, 48- and 64-bit state, all of which
...
Capacity and Data Complexity in Multidimensional Linear Attack
multidimensional linear attack capacity data complexity
font style='font-size:12px;'>
2016/1/27
Multidimensional linear attacks are one of the most powerful
variants of linear cryptanalytic techniques now. However, there is no
knowledge on the key-dependent capacity and data complexity so far....
Note of Multidimensional MITM Attack on 25-Round TWINE-128
Block Ciphers Cryptanalysis TWINE
font style='font-size:12px;'>
2016/1/9
TWINE is a lightweight block cipher proposed in SAC 2012
by Suzaki et al.. TWINE operates on 64-bit block and supports 80 or 128-
bit key, denoted as TWINE-80 and TWINE-128 respectively. TWINE
has ...
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
statistical cryptanalysis block cipher chosen plaintext
font style='font-size:12px;'>
2016/1/3
The mere number of various apparently different statistical attacks on block ciphers has raised the question about their relationships which would allow to classify them and determine those that give ...
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
decorrelation theory multidimensional linear cryptanalysis truncated differential cryptanalysis
font style='font-size:12px;'>
2015/12/31
The decorrelation theory provides a different point of view
on the security of block cipher primitives. Results on some statistical attacks
obtained in this context can support or provide new insigh...
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
multidimensional linear attack zero-correlation linear
font style='font-size:12px;'>
2015/12/22
The power of a statistical attack is inversely proportional to
the number of plaintexts necessary to recover information on the encryption
key. By analyzing the distribution of the random variables ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
font style='font-size:12px;'>
2012/6/14
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST, KTANTAN Hummingbird
font style='font-size:12px;'>
2012/3/22
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
font style='font-size:12px;'>
2012/3/21
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Authenticating Aggregate Range Queries over Multidimensional Dataset
Authentication Aggregate Query Database Outsourcing
font style='font-size:12px;'>
2010/2/1
We are interested in the integrity of the query results from
an outsourced database service provider. Alice passes a set D
of d-dimensional points, together with some authentication
tag T, to an un...