搜索结果: 1-2 共查到“军事学 Constraint Programming”相关记录2条 . 查询时间(0.046 秒)
Analysis of AES, SKINNY, and Others with Constraint Programming
Differential Cryptanalysis Integral Cryptanalysis Constraint Programming
2017/2/24
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show ...
Revisiting AES Related-Key Differential Attacks with Constraint Programming
AES Constraint Programming Related Key differential
2017/2/21
The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversary models. In this paper...