搜索结果: 1-6 共查到“密码学 HIGHT”相关记录6条 . 查询时间(0.046 秒)
MILP-Based Automatic Differential Searches for LEA and HIGHT
MILP model Differential Attack ARX ciphers
font style='font-size:12px;'>
2018/11/7
In this paper we use MILP technique for automatic search for differential characteristics of ARX ciphers LEA and HIGHT. We show that the MILP model of the differential property of modular addition wit...
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
secret-key cryptography HIGHT
font style='font-size:12px;'>
2018/1/15
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypte...
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
Biclique Cryptanlysis Attack Complexity
font style='font-size:12px;'>
2014/3/10
In this paper, we present a framework for biclique cryptanalysis of block ciphers with an extremely low data complexity. To that end, we enjoy a new representation of biclique attack. Then an algorith...
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
secret-key cryptography
font style='font-size:12px;'>
2012/6/14
TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/...
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
secret-key cryptography
font style='font-size:12px;'>
2012/3/22
TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/...
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
secret-key cryptography
font style='font-size:12px;'>
2012/3/21
TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ciphers are based on the simple operations XOR, modular addition and shift/...