搜索结果: 1-6 共查到“军事学 FOX”相关记录6条 . 查询时间(0.045 秒)
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
block cipher meet-in-the-middle attack all-subkeys recovery attack
2015/12/29
The all-subkeys recovery (ASR) attack is an extension of the meet-in-the-middle
attack, which allows evaluating the security of a block cipher without analyzing its key
scheduling function. Combinin...
In this paper, based on a di?erential property of two round
Lai-Massay scheme in a fault model, we present an improved fault attack
on the block cipher FOX64. Our improved method can deduce any roun...
Block ciphers are the very foundation of computer and information
security. FOX, also known as IDEA NXT, is a family
of block ciphers published in 2004 and is famous for its
provable security to cr...
Improved Integral Cryptanalysis of FOX Block Cipher
Block cipher FOX Data complexity Time complexity
2009/2/27
FOX is a new family of block ciphers presented recently,
which is based upon some results on proven security and has high per-
formances on various platforms. In this paper, we construct some distin...
FOX Algorithm Implementation: a hardware design approach
FOX Algorithm Implementation hardware design approach
2009/2/9
Encryption algorithms are becoming
more necessary to ensure data is securely transmitted
over insecure communication channels. FOX is
a recently developed algorithm and its structure is
based on t...
FOX Algorithm Implementation:a hardware design approach
FOX Algorithm Implementation hardware design approach
2009/2/8
Encryption algorithms are becoming
more necessary to ensure data is securely transmitted
over insecure communication channels. FOX is
a recently developed algorithm and its structure is
based on t...