搜索结果: 1-3 共查到“军队指挥学 Sbox”相关记录3条 . 查询时间(0.05 秒)
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak
Keccak SHA-3 hash function
2017/6/8
The Keccak hash function is the winner of the SHA-3 competition and became the SHA-3 standard of NIST in 2015. In this paper, we focus on practical collision attacks against round-reduced Keccak hash ...
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
secret-key cryptography / Sbox Boolean function hash functions
2013/4/18
In several cryptographic primitives, Sboxes of small size are used to provide nonlinearity. After several iterations, all the output bits of the primitive are ideally supposed to depend in a nonlinear...
Super-Sbox Cryptanalysis:Improved Attacks for AES-like permutations
hash function cryptanalysis AES
2009/11/18
In this paper, we improve the recent rebound and start-from-the-middle
attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that
one can view two rounds of such permutatio...