搜索结果: 1-15 共查到“军事学 key recovery attacks”相关记录25条 . 查询时间(0.1 秒)
We show that Legendre PRF, recently suggested as an MPC-friendly primitive in a prime field ZpZp, admits key recovery attacks of complexity O(p√)O(p) rather than previously assumed O(p)O(p). We also d...
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Conditional Cube Attack Keccak Ketje Jr
2019/5/9
Conditional cube attack was proposed by Huang et al. at EUROCRYPT 2017 to attack Keccak keyed mode. Inspired by dynamic cube attack, they reduce the degree by appending key bit conditions on the initi...
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
AES Mixture Differential
2018/6/5
Determining the security of AES is a central problem in cryptanalysis, but progress in this area had been slow and only a handful of cryptanalytic techniques led to significant advancements. At Eurocr...
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
block cipher Even-Mansour ciphers meet-in-the-middle attack
2017/9/14
Chen et al. proved that two variants of the two-round n-bit Even-Mansour ciphers are secure up to 22n/3 queries against distinguish- ing attacks. These constructions can be regarded as minimal two-rou...
In the quantum model, by utilizing the Simon's algorithm, we propose an efficient universal forgery attack to FKS, FKD and Keyak with complexity of O(c)O(c). Moreover, we also propose an efficient key...
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme
Levelled homomorphic encryption adaptive attacks
2016/12/26
A major open problem is to protect leveled homomorphic encryption from adaptive attacks that allow an adversary to learn the private key. The only positive results in this area are by Loftus, May, Sma...
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
CAESAR competition cryptanalysis authenticated encryption
2016/12/10
AEZ is a parallelizable, AES-based authenticated encryption algorithm that is well suited for software implementations on processors equipped with the AES-NI instruction set. It aims at offering excep...
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Authenticated encryption CAESAR ELmD
2016/6/22
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide ...
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
multiple linear cryptanalyis LLR statistic chi-squared statistic
2016/4/26
The log-likelihood ratio (LLR) test statistic has been proposed in the literature for performing statistical analysis of attacks on block ciphers. A limitation of the LLR test statistic is that its ap...
Speed Optimizations in Bitcoin Key Recovery Attacks
Bitcoin Elliptic Curve Cryptosystem Cryptocurrency
2016/2/23
In this paper we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitcoin and other cryptocur...
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Block cipher Kalyna Key Recovery
2016/1/26
The Kalyna block cipher has recently been established as the Ukranian encryption standard in June, 2015. It was selected in a Ukrainian National Public Cryptographic Competition running from 2007 to 2...
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes
Somewhat Homomorphic Encryption Key Recovery Attack,
2016/1/8
In his seminal paper at STOC 2009, Gentry left it as a future work to
investigate (somewhat) homomorphic encryption schemes with IND-CCA1 security.
At SAC 2011, Loftus et al. showed an IND-CCA1 atta...
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Stream cipher Grain cipher State recovery attack
2016/1/5
A novel internal state recovery attack on the whole Grain family of ciphers is
proposed in this work. It basically uses the ideas of BSW sampling along with employing
a weak placement of the tap pos...
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
HMAC NMAC Whirlpool universal forgery
2016/1/4
A main contribution of this paper is an improved analysis against HMAC instantiating with reduced Whirlpool. It recovers equivalent keys, which are often denoted as Kin and Kout, of HMAC with 7-round ...
Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes
Somewhat Homomorphic Encryption Key Recovery Attack IND-CCA1 Security
2016/1/4
A key recovery attack allows an attacker to recover the private key of an
underlying encryption scheme when given a number of decryption oracle accesses. Previous
research has shown that most existi...