搜索结果: 1-15 共查到“军队指挥学 Grain-like”相关记录27条 . 查询时间(0.119 秒)
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
Cryptography FPGA microprocessor
2019/6/26
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
New Configurations of Grain Ciphers: Security Against Slide Attacks
Grain security new configurations
2018/7/20
eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including Grain v0 and its revised version Grain v1. The latter was selected as a finalist of the competition...
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
Fast correlation attack Stream cipher LFSR
2018/6/5
A fast correlation attack (FCA) is a well-known cryptanalysis technique for LFSR-based stream ciphers. The correlation between the initial state of an LFSR and corresponding key stream is exploited, a...
Fast Near Collision Attack on the Grain v1 Stream Cipher
Cryptanalysis Stream ciphers Grain
2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
chosen IV attack distinguishing attack statistical attack
2017/11/20
We propose a new attack framework based upon cube testers and d-monomial tests. The d-monomial test is a general framework for comparing the ANF of the symmetric cipher’s output with ANF of a random B...
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Differential Fault Attack Stream Cipher Grain v1
2017/7/14
Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault. In th...
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently
Stream ciphers Grain-128 Polynomial reduction
2017/5/15
In this paper, we propose a reduction technique that can be used to determine the density of IV terms of a complex multivariable boolean polynomial. Using this technique, we revisit the dynamic cube a...
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Stream Ciphers Time-Memory-Data Tradeoff Attacks Security Lower Bound Proofs
2017/4/5
Time-Memory-Data tradeoff attacks (TMD-attacks) like those of Babbage, Biryukov and Shamir, and Dunkelman and Keller reduce the security level of keystream generator based-stream ciphers to L/2L/2, wh...
This work exposes further vulnerabilities in virtualized cloud servers by mounting Cross-VM cache attacks in Xen and VMware VMs targeting AES running in the victim VM. Even though there exists a ri...
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Boolean Function Grain v1 Grain-128a
2016/1/8
In 2005, Hell, Johansson and Meier submitted a stream cipher proposal named Grain
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the
hardware category...
A Dynamic Cube Attack on $105$ round Grain v1
eStream Differential Cryptanalysis Dynamic Cube Attack
2016/1/7
As far as the Differential Cryptanalysis of reduced round Grain
v1 is concerned, the best results were those published by Knellwolf et al. in
Asiacrypt 2011. In an extended version of the paper, it ...
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions
Stream Cipher Differential Fault Attack Multi-Bit Fault
2016/1/7
Very few differential fault attacks (DFA) were reported on Grain-128 so far. In this
paper we present a generic attack strategy that allows the adversary to challenge the cipher under
different mult...
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Stream cipher Grain cipher State recovery attack
2016/1/5
A novel internal state recovery attack on the whole Grain family of ciphers is
proposed in this work. It basically uses the ideas of BSW sampling along with employing
a weak placement of the tap pos...
A New Distinguisher on Grain v1 for 106 rounds
Differential Cryptanalysis Distinguisher Grain v1
2015/12/31
In Asiacrypt 2010, Knellwolf, Meier and Naya-Plasencia proposed
distinguishing attacks on Grain v1 when (i) Key Scheduling process
is reduced to 97 rounds using 227 chosen IVs and (ii) Key Schedulin...