搜索结果: 1-10 共查到“军队指挥学 Hummingbird-2”相关记录10条 . 查询时间(0.068 秒)
Related-key Attacks Against Full Hummingbird-2
Hummingbird-2 Related-Key Cryptanalysis Lightweight Cryptography Authenticated Encryption
2013/4/18
We present attacks on full Hummingbird-2 which are able to recover the 128-bit secret keys of two black box cipher instances that have a certain type of low-weight XOR difference in their keys. We cal...
Hummingbird: Privacy at the time of Twitter
privacy micro-blogging OSN multi-party computation
2012/6/14
In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken the world by storm, now boasting over 100 million subscribers. As an unparalleled stage for an enor...
Hummingbird: Privacy at the time of Twitter
privacy micro-blogging OSN multi-party computation
2012/3/21
In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken the world by storm, now boasting over 100 million subscribers. As an unparalleled stage for an enor...
Hummingbird: Privacy at the time of Twitter
privacy micro-blogging OSN multi-party computation
2012/3/22
In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken the world by storm, now boasting over 100 million subscribers. As an unparalleled stage for an enor...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
2012/6/14
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST, KTANTAN Hummingbird
2012/3/22
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
2012/3/21
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird cipher constrained devices lightweight cryptography ISO 18000-6C
2012/3/29
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it's pre...
Cryptanalysis of Hummingbird
Hummingbird cipher constrained devices lightweight cryptography stream cipher cryptanalysis
2010/12/1
Hummingbird-1 is a lightweight encryption and message authentication primitive published in RISC ’09 and WLC ’10. Hummingbird-1 utilizes a 256-bit secret key and a 64-bit IV. We report a chosen-IV, ch...
Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm
Lightweight Cryptography FPGA Implementation Coprocessor Approach
2010/11/22
Hummingbird is a novel ultra-lightweight cryptographic algorithm aiming at resource-constrained devices. In this work, an enhanced hardware implementation of the Hummingbird cryptographic algorithm fo...