搜索结果: 1-15 共查到“军事学 distinguishing”相关记录22条 . 查询时间(0.069 秒)
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Division property cube attacks MILP Trivium
2019/4/16
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, it is shown to be powerful against Trivium-like ciphers. Traditional cube attacks are experimental att...
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers
Generalized Feistel cipher Simon's algorithm Grover search,
2019/4/1
A generalized Feistel cipher is one of the methods to construct block ciphers, and it has several variants. Dong, Li, and Wang showed quantum distinguishing attacks against the (2d−1)(2d−1...
Distinguishing Error of Nonlinear Invariant Attacks
correlation uniform random function uniform random permutation
2018/11/7
Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daeman and Rijmen (2007) had obtained the distributions of the correlations ...
Limitation of the HHSS Obfuscation: Lattice based Distinguishing Attack
Cryptanalysis Indistinguishability Obfuscation Matrix Branching Program
2018/5/3
Indistinguishability Obfuscation (iOiO) is a hopeful tool which obfuscates a program with the least leakage, and produces various applications including functional encryption. Recently, a state-of-the...
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
secret-key cryptography HIGHT
2018/1/15
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypte...
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
chosen IV attack distinguishing attack statistical attack
2017/11/20
We propose a new attack framework based upon cube testers and d-monomial tests. The d-monomial test is a general framework for comparing the ANF of the symmetric cipher’s output with ANF of a random B...
Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations
Cryptanalysis Hash function Rebound attacks
2017/6/5
We consider highly structured truncated differential paths to mount rebound attacks on hash functions based on AES-like permutations. We explain how such differential paths can be computed using a Mix...
A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher
stream cipher Sprout distinguishing attack
2016/1/3
Sprout is a new lightweight stream cipher proposed at FSE 2015. According to its designers, Sprout can resist time-memory-data trade-off (TMDTO) attacks with small internal state size. However, we fin...
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation
iterated random permutation blockcipher cascade encryption
2015/12/29
Let P be chosen uniformly from the set P := Perm(S), the set of all permutations over a
set S of size N. In Crypto 2015, Minaud and Seurin proved that for any unbounded time adversary A,
making at m...
Distinguishing a truncated random permutation from a random function
Pseudo random permutations pseudo random functions advantage
2015/12/24
An oracle chooses a function f from the set of n bits strings to itself, which is either a randomly chosen permutation or a randomly chosen function. When queried by an n-bit string w, the oracle comp...
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Data Complexity Distinguisher Distinguishing Attack
2015/12/18
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing
attacks on stream ciphers and analyze their inter-relationships. In the process, we formal...
Distinguishing Attacks on RC4 and A New Improvement of the Cipher
secret-key cryptography / RC4 Bias Distinguishing attacks state
2013/4/18
RC4, designed by Rivest in 1987, is the most widely deployed stream cipher in practical applications. In this paper, two new class of statistical biases inherent in RC4 are depicted and it is shown th...
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
Skein Differential analysis Related key Boomerang attack
2012/3/27
On Nov 2007, NIST announced the SHA-3 competition to select a new hash standard as a replacement of SHA-2. On Dec 2010, five submissions have been selected as the final round candidates, including Ske...
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
Distinguishing Attacks Stream Ciphers Pseudo-random Words
2009/9/2
In numerous modern stream ciphers, the internal state consists of
a large array of pseudo-random words, and the output key-stream is
a relatively simple function of the state. In [16], it was heuris...
Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network
Generalized Unbalanced Feistel Network Integral Distinguisher Non-surjective Distinguisher
2009/7/22
Recently, a new kind of Generalized Unbalanced Feistel Net-
work, denoted as GUFN-n, is proposed by Choy et al. at ACISP 2009.
The advantages of this structure are that it allows parallel computatio...