搜索结果: 1-5 共查到“军队指挥学 Isomorphisms”相关记录5条 . 查询时间(0.093 秒)
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
AES block ciphers cryptanalysis linear cryptanalysis
2013/4/18
In [eprint.iacr.org/2012/663] method of virtual isomorphisms of ciphers was applied for differential/linear cryptanalysis of AES. It was shown that AES seems to be weak against those attacks. That res...
Changing probabilities of differentials and linear sums via isomorphisms of ciphers
Changing probabilities linear sums isomorphisms of ciphers
2009/6/12
Ciphers y = C(x, k) and = (, ) are isomorphic if there exists invertible computable in
both directions map y « , x « , k « ....
An Attack on the Isomorphisms of Polynomials Problem with One Secret
cryptanalysis multivariate polynomials
2009/4/15
At EUROCRYPT '96 J. Patarin introduced the Isomorphisms
of Polynomials (IP) problem as a basis of authentication and
signature schemes [4, 5]. We describe an attack on the secret key of IP
with one...
On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems
Pairing-based cryptography Tate pairing elliptic curve
2009/2/5
In this paper we examine the hard problems underlying asymmetric
pairings, their precise relationships and how they affect a number
of existing protocols. Furthermore, we present a new model for the...
AES side channel attacks protection using random isomorphisms
AES block ciphers finite field
2009/1/21
General method of side-channel attacks protection, based on random cipher isomorphisms is
presented. Isomorphic ciphers produce common outputs for common inputs. Cipher isomorphisms
can be changed i...