搜索结果: 1-9 共查到“军队指挥学 Differential Analysis”相关记录9条 . 查询时间(0.062 秒)
Truncated, Impossible, and Improbable Differential Analysis of Ascon
Ascon Truncated Differential Impossible Differential
font style='font-size:12px;'>
2016/5/23
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition
for Authenticated Encryption: Security, Applicability, and Robustness. So far, succe...
Automatic Differential Analysis of ARX Block Ciphers: with Application to SPECK and LEA
ARX SPECK LEA
font style='font-size:12px;'>
2016/3/1
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with respect to XOR-difference, and develop Mouha et al.'s framework of finding differential characteristics by...
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher
Lightweight Block Cipher RoadRunneR
font style='font-size:12px;'>
2016/2/23
RoadRunneR is a small and fast bitslice lightweight block cipher for low cost 8-bit processors proposed by Adnan Baysal and Sa ̈hap S ̧ahin in the LightSec 2015 conference. While most softwa...
Differential Analysis on Block Cipher PRIDE
Differential Analysis Block Cipher PRIDE
font style='font-size:12px;'>
2016/1/8
The lightweight block cipher PRIDE designed by Albrecht
et al., appears in CRYPTO 2014. The designers claim that their method
of constructing linear layer is good both in security and efficiency. In...
Differential Analysis of Block Ciphers SIMON and SPECK
symmetric-key differential trail tools for cryptanalysis
font style='font-size:12px;'>
2016/1/6
In this paper we continue the previous line of research on the analysis of the differential
properties of the lightweight block ciphers Simon and Speck. We apply a recently proposed technique
for au...
Improved Differential Analysis of Block Cipher PRIDE
Block Cipher PRIDE Differential attack
font style='font-size:12px;'>
2016/1/5
In CRYPTO 2014 Albrecht et al. brought in a 20-round iterative
lightweight block cipher PRIDE which is based on a good linear
layer for achieving a tradeoff between security and efficiency. A recent...
Higher Order Differential Analysis of NORX
NORX Authenticated Encryption CAESAR
font style='font-size:12px;'>
2016/1/3
In this paper, we analyse the higher order differential properties of NORX, an AEAD
scheme submitted to CAESAR competition. NORX is a sponge based construction. Previous efforts,
by the designers th...
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE
TWINE LBlock meet-in-the-middle
font style='font-size:12px;'>
2016/1/3
TWINE is a recent lightweight block cipher based on a Feistel structure. We first present two new attacks on TWINE-128 reduced to 25 rounds that have a slightly higher overall complexity than the 25-r...
Related-key Impossible Differential Analysis of Full Khudra
Lightweight Block Cipher Khudra
font style='font-size:12px;'>
2015/12/23
Khudra is a 18-round lightweight block cipher proposed by
Souvik Kolay and Debdeep Mukhopadhyay in the SPACE 2014 conference
which is applicable to Field Programmable Gate Arrays (FPGAs).
In this p...