搜索结果: 1-6 共查到“军事学 paths”相关记录6条 . 查询时间(0.046 秒)
Generating Graphs Packed with Paths
Linear cryptanalysis Differential cryptanalysis Linear Approximations
2018/8/21
When designing a new symmetric-key primitive, the designer must show resistance to know attacks. Perhaps most prominent amongst these are linear and differential cryptanalysis. However, it is notoriou...
A heuristic for finding compatible differential paths with application to HAS-160
akircanski at gmail com
2014/3/12
The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this context, attacks typically proceed by starting from the middle and...
Effect of the Dependent Paths in Linear Hull
secret-key cryptography Linear Hull Dependency of Linear Paths Weak
2010/7/13
Linear Hull is a phenomenon that there are a lot of linear paths with the same data mask but different key masks for a block cipher. In 1994, Nyberg presented the effect on the key-recovery attack suc...
The TIB3-256 hashing algorithm [3] is a first round candidate
in the SHA-3 competition [2]. Properties of the message expansion
and the PHTX function are observed, and then exploited to create
new ...
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
MD4 Differential Path APOP NMAC
2009/6/2
In case of security analysis of hash functions, finding a good
collision-inducing differential paths has been only focused on. However,
it is not clear how differential paths of a hash function infl...
Computing Almost Exact Probabilities of Diferential Hash Collision Paths by Applying Appropriate Stochastic Methods
Hash function collision path postaddition
2009/6/2
Generally speaking, the probability of a differential path determines
an upper bound for the expected workload and thus for the
true risk potential of a dierential attack. In particular, if the exp...