搜索结果: 1-5 共查到“军事学 Gift”相关记录5条 . 查询时间(0.058 秒)
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Boomerang connectivity table GIFT Automatic search
2019/6/10
In Eurocrypt 2018, Cid et al. proposed a novel notion called the boomerang connectivity table, which formalised the switch property in the middle round of boomerang distinguishers in a unified approac...
FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers
Lightweight cryptography PRESENT
2018/11/5
Lightweight block ciphers are today of paramount importance to provide security services in constrained environments. Recent studies have questioned the security properties of PRESENT, which makes it ...
MILP-based Differential Attack on Round-reduced GIFT
GIFT Differential Cryptanalysis Lightweight Block Cipher
2018/5/2
At Asiacrypt 2014, Sun et al. proposed a MILP model to search differential trails for bit-oriented block ciphers. In this paper, we improve this model to search differential characteristics of GIFT, a...
Threshold Implementations of GIFT: A Trade-off Analysis
Side-channel Threshold Implementation DPA
2017/10/30
Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using dif...
In this article, we revisit the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design u...