搜索结果: 1-11 共查到“军事学 internal”相关记录11条 . 查询时间(0.077 秒)
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD
FlexAEAD Distinguisher Iterated Differential
2019/5/23
In this draft, the internal keyed permutation of FlexAEAD has been analysed. In our analysis, we have first reported an iterated truncated differential for one round which holds with a probability of ...
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
white-box cryptography differential computational analysis software execution traces
2018/4/4
The goal of white-box cryptography is to implement cryptographic algorithms securely in software in the presence of an adversary that has complete access to the software's program code and execution e...
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
IRC Physical attacks Fault attacks
2017/9/25
A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or st...
Necessary conditions for designing secure stream ciphers with the minimal internal states
Stream Cipher Ultra-lightweight Lightweight
2017/8/10
After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design of stream ciphers by using a secret key, not only in the initialization...
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
Deoxys AES authenticated encryption
2017/7/24
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deox...
Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying
key lifetime re-keying key diversification
2017/7/24
In this paper we introduce a classification of existing approaches to increase the security of block cipher operation modes based on re-keying, putting the focus on so-called internal re-keying withou...
Fruit: Ultra-Lightweight Stream Cipher with Shorter Internal State
Stream cipher ultra-lightweight Lightweight
2016/4/12
In eSTREAM project, a few lightweight stream cipher for hardware was introduced
(2008) and then in FSE 2015 Sprout was proposed. Sprout introduced a new idea,
design of stream cipher with shorter in...
On Lightweight Stream Ciphers with Shorter Internal States
Stream Ciphers Lightweight Cryptography
2016/1/4
To be resistant against certain time-memory-data-tradeoff
(TMDTO) attacks, a common rule of thumb says that the internal state
size of a stream cipher should be at least twice the security parameter...
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
SHA-3 Keccak internal differential
2016/1/3
We introduce internal differential boomerang distinguisher as a combination
of internal differentials and classical boomerang distinguishers. The new
boomerangs can be successful against cryptograph...
Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
side-channel analysis acquisition
2014/3/13
Measuring power consumption for side-channel analysis typically uses an oscilloscope, which measures the data relative to an internal sample clock. By synchronizing the sampling clock to the clock of ...
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
Encryption Algorithm Key-stream Generator Chinese Text Messages Character Internal Code Structure
2009/4/17
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure.