搜索结果: 1-10 共查到“biclique.”相关记录10条 . 查询时间(0.189 秒)
A Star-based Independent Biclique Attack on Full Rounds SQUARE
Block cipher SQUARE Biclique attack Star-based independent biclique
2016/1/27
SQUARE is an iterated block cipher proposed by Daemen et.al. in FSE1997. Inspired
by Bogdanov et.al.’s recent works [12], we first present an improved biclique attack, i.e. stat-based
independent bi...
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
balanced biclique attack star-based biclique PRINCE
2016/1/27
Inspired by the paper [10], using better differential characteristics in the biclique
construction, we give another balanced biclique attack on full rounds PRINCE with the lower
complexity in this p...
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Sliced Biclique cryptanalysis hash functions collision attack
2016/1/3
In this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function H based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN). This attack...
In this paper we present the first biclique cryptanalysis of MIBS block cipher
and a new biclique cryptanalysis of PRESENT block cipher. These attacks are
performed on full-round MIBS-80 and full-ro...
ARIRANG-256的Biclique攻击
分组密码 ARIRANG-256 Biclique攻击 中间相遇 复杂度
2014/3/20
对SHA-3计划候选算法ARIRANG采用的分组密码ARIRANG-256进行了安全性分析。利用ARIRANG-256的密钥扩展与算法本身的加密结构,建立9轮32维的Bicliques,并利用建立的Bicliques给出完整40轮ARIRANG-256的Biclique攻击结果,数据复杂度为232,计算复杂度为2510.8。攻击对数据量的要求非常小且计算复杂度优于穷举搜索攻击,是Biclique攻...
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
Biclique Cryptanlysis Attack Complexity
2014/3/10
In this paper, we present a framework for biclique cryptanalysis of block ciphers with an extremely low data complexity. To that end, we enjoy a new representation of biclique attack. Then an algorith...
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
Biclique cryptanalysis Asymmetric key partitioning Non-isomorphic bicliques Block ciphers mCrypton
2013/4/18
Biclique attack, is a new cryptanalytic technique which brings new tools from the area of hash functions to the area of block cipher cryptanalysis. Till now, this technique is the only one able to ana...
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
lightweight cryptography biclique attack KLEIN family
2013/4/18
In this paper we present a biclique attack on the newly proposed block cipher KLEIN-64. We first introduce some weaknesses of the diffusion layer and key schedule of this algorithm. Then we exploit th...
Biclique Cryptanalysis of the Block Cipher SQUARE
secret-key cryptography / Block cipher cryptanalysis biclique differential SQUARE
2012/3/26
SQUARE, an 8-round substitution-permutation block cipher, is considered as the predecessor of the AES. In this paper, inspired from the recent biclique attack on the AES by Bogdanov et al., we present...
Biclique Cryptanalysis of the Full AES
secret-key cryptography / block ciphers bicliques AES key recovery preimag
2012/3/26
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has been one of the mos...