搜索结果: 1-15 共查到“军事学 k-out-of-n property”相关记录48条 . 查询时间(0.13 秒)
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Division property cube attacks MILP Trivium
2019/4/16
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, it is shown to be powerful against Trivium-like ciphers. Traditional cube attacks are experimental att...
Linearly equivalent S-boxes and the Division Property
Cryptanalysis Division Property RECTANGLE
2019/2/27
Division property is a new cryptanalysis method introduced by Todo at Eurocrypt'15 that proves to be very efficient on block ciphers and stream ciphers. It can be viewed as a generalization or a more ...
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
linear cryptanalysis DES 3DES
2019/1/2
In this paper we extend the work presented by Ashur and Posteuca in BalkanCryptSec 2018, by designing 0-correlation key-dependent linear trails covering more than one round of DES. First, we design a ...
MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets
Division property using three subsets Integral distinguisher MILP
2018/12/11
Division property is a generalized integral property proposed by Todo at EUROCRYPT 2015, and then conventional bit-based division property (CBDP) and bit-based division property using three subsets (B...
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
Division Property Three-Subset STP
2018/12/11
The division property proposed at Eurocrypt'15 is a novel technique to find integral distinguishers, which has been applied to most kinds of symmetric ciphers such as block ciphers, stream ciphers, an...
Adversarially Robust Property Preserving Hash Functions
Hash function compression property-preserving
2018/12/3
Property-preserving hash functions are usually probabilistic: they use the random choice of a hash function from a family to achieve compression, and as a consequence, err on some inputs. Traditionall...
Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions
hash functions quantum attacks
2018/11/13
Hash functions are of fundamental importance in theoretical and in practical cryptography, and with the threat of quantum computers possibly emerging in the future, it is an urgent objective to unders...
Blending FHE-NTRU keys – The Excalibur Property
cryptographic protocols multiparty computaion fully homomorphic encryption
2018/9/6
Can Bob give Alice his decryption secret and be convinced that she will not give it to someone else? This is achieved by a proxy re-encryption scheme where Alice does not have Bob’s secret but instead...
Improved Division Property Based Cube Attacks Exploiting Low Degree Property of Superpoly
Cube attack Division property MILP
2017/11/10
We apply our technique to stream cipher TRIVIUM and KREYVIUM. For TRIVIUM, benefited from our techniques, we, for the first time, can recover the superpoly of 833-rounds with cube dimension 73, and co...
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Automatic search Division property ARX
2017/9/13
Division property is a generalized integral property proposed by Todo at Eurocrypt 2015. Previous tools for automatic searching are mainly based on the Mixed Integer Linear Programming (MILP) method a...
Standardizing Bad Cryptographic Practice - A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property
Digital rights management Hardware security implementation Best practices for EDA
2017/9/1
We provide an analysis of IEEE standard P1735, which describes methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP. We find a su...
Assessing the No-Knowledge Property of SpiderOak ONE
Cloud storage end-to-end encryption SpiderOak
2017/6/15
This paper presents the findings of an independent security review of SpiderOak ONE, a popular encrypted cloud storage application. In this application, the storage provider claims that, since all the...
Cube Attacks on Non-Blackbox Polynomials Based on Division Property
Cube attack Stream cipher Division property
2017/4/11
The cube attack is one of powerful cryptanalytic techniques and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack,...
Improved Hybrid Consensus Scheme with Privacy-preserving Property
Block chain Proof-of-work Consensus
2017/3/6
Proof-of-work-based consensus, adopted in Bitcoin, has already drawn much attention from cryptocurrency and block chain commu- nity. Despite its nice decentralization property, it has significant lim-...
AES is probably the most widely studied and used block cipher. Also versions with a reduced number of rounds are used as a building block in many cryptographic schemes, e.g. several candidates of the ...