搜索结果: 1-12 共查到“军事学 characteristics”相关记录12条 . 查询时间(0.341 秒)
Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables
Boolean functions affine classification nonlinearity algebraic degree
2019/5/27
Recently one new key recovery method for a filter generator was proposed. It is based on so-called planar approximations of such a generator. This paper contains the numerical part of the research of ...
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Truncated Differential Cryptanalysis TWEAKEY MANTIS
2017/11/28
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implication...
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
differential cryptanalysis independent S-box fixed key
2017/5/31
The current paper studies the probability of differential characteristics for an unkeyed (or with a fixed key) construction. Most notably, it focuses on the gap between two probabilities of differenti...
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Automatic cryptanalysis Related-key differential cryptanalysis Linear cryptanalysis
2016/1/7
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of
the differential and linear behavior of a wide range of block ciphers. We point out that the differential
behav...
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON
Automatic cryptanalysis Related-key differential attack Mixed-integer Linear Programming
2016/1/4
In IACR ePrint 2014/747, a method for constructing mixed-integer linear programming (MILP) models whose feasible regions are exactly the sets of all possible differential (or linear) characteristics f...
Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20
Evaluation Tool SAT solver
2014/3/12
An increasing number of cryptographic primitives are built using the ARX operations: addition modulo $2^n$, bit rotation and XOR. Because of their very fast performance in software, ARX ciphers are be...
Some results concerning global avalanche characteristics of two $q$-ary functions
functions avalanche characteristics
2014/3/7
The global avalanche characteristics criteria was first introduced by Zhou et al. (Inform. Sci. 180(2) (2010) 256-265). This article is concerned with some new bounds on global avalanche characteristi...
Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics
Elliptic curves Hyperelliptic curves Non-hyperelliptic curves
2009/6/15
In this paper, we present a classification of classes of elliptic curves
defined over cubic extension of finite fields with odd characteristics, which
have coverings over the finite fields therefore...
On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
Elliptic curve cryptosystems Discrete logarithm problem GHS attack
2009/6/4
In this paper, we present algorithms for implementation of the GHS attack to Elliptic
curve cryptosystems (ECC). In particular, we consider two large classes of elliptic curves
over cubic extension ...
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
generalized non-adjacent form (GNAF) radix-r non-adjacent form (rNAF) Frobenius-adic expansions Elliptic Curve Cryptosystems (ECC)
2009/3/19
In elliptic curve cryptosystems, scalar multiplications performed
on the curves have much effect on the efficiency of the schemes,
and many efficient methods have been proposed. In particular, recod...
The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
Block ciphers Feistel schemes DES S-box design
2009/2/16
In about every book about cryptography, we learn that the
plaintext complexity of differential cryptanalysis on DES is 247, as reported
by Biham and Shamir in [2]. Yet few people realise that in a
...
Characteristics of Key-Dependent S-Boxes: the Case of Twofish
key-dependent s-boxes linear cryptanalysis differential cryptanalysis
2009/2/5
In this paper we analyze and discuss the cryptographic ro-
bustness of key-dependent substitution boxes (KDSBs); these can be
found in some symmetric-key algorithms such as Khufu, Blowfish, and
the...