搜索结果: 1-5 共查到“密码学 Divide-and-Conquer”相关记录5条 . 查询时间(0.045 秒)
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
hash function Troika preimage
2019/6/4
Troika is a recently proposed sponge-based hash function for IOTA's ternary architecture and platform, which is developed by CYBERCRYPT. In this paper, we introduce the preimage attack on 2 and 3 roun...
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach
Block Cipher Differential Cryptanalysis MILP
2019/1/9
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of symmetric-key primitives. For differential and linear cryptanalysis, MILP can be used to solve the two...
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
Keccak-MAC Divide-and-Conquer Attacks Cube Attacks
2018/1/17
Keccak is the final winner of SHA-3 competition and it can be used as message authentic codes as well. The basic and balanced divide-and-conquer attacks on Keccak-MAC were proposed by Dinur et al. at ...
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented
divide-and-conquer algorithm data expansion merge sort
2016/12/8
In the literature there are some divide-and-conquer algorithms, such as
Karatsuba’s algorithm and Strassen’s algorithm, which play a key role in analyzing the
performance of some cryptographic proto...
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator
stream ciphers clock-controlled generators shrinking generator
2009/2/6
The shrinking generator is a well-known key stream generator composed
of two LFSR’s, LFSRx and LFSRc, where LFSRx is clock-controlled
according to the regularly clocked LFSRc. In this paper we inves...