搜索结果: 1-9 共查到“军队指挥学 data complexity”相关记录9条 . 查询时间(0.234 秒)
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
PRINCE Subspace Trails Cryptanalysis Invariant Subspace Attack
2016/12/8
Subspace trail cryptanalysis is a very recent new cryptanalysis
technique, and includes differential, truncated differential, impossible
differential, and integral attacks as special cases.
Can Large Deviation Theory be Used for Estimating Data Complexity?
block ciphers cryptanalysis data complexity
2016/5/17
Statistical analysis of attacks on block ciphers have mostly used normal approximations. A few recent works have proposed doing away with normal approximations and instead use Chernoff and Hoeffding b...
Capacity and Data Complexity in Multidimensional Linear Attack
multidimensional linear attack capacity data complexity
2016/1/27
Multidimensional linear attacks are one of the most powerful
variants of linear cryptanalytic techniques now. However, there is no
knowledge on the key-dependent capacity and data complexity so far....
This work proposes substantial algorithmic enhancements to
the SPEA attack of Schl¨osser et al. [16] by adding cryptographic postprocessing,
and improved signal processing to the photonic measuremen...
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
multidimensional linear attack zero-correlation linear
2015/12/22
The power of a statistical attack is inversely proportional to
the number of plaintexts necessary to recover information on the encryption
key. By analyzing the distribution of the random variables ...
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Data Complexity Distinguisher Distinguishing Attack
2015/12/18
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing
attacks on stream ciphers and analyze their inter-relationships. In the process, we formal...
Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT
Biclique Cryptanlysis Attack Complexity
2014/3/10
In this paper, we present a framework for biclique cryptanalysis of block ciphers with an extremely low data complexity. To that end, we enjoy a new representation of biclique attack. Then an algorith...
Low Data Complexity Attacks on AES
AES Cryptanalysis Side Channel Attacks Slide Attacks LEX
2010/12/14
The majority of current attacks on reduced-round variants of block ciphers seeks to maximize the number of rounds that can be broken, using less data than the entire codebook and less time than exhaus...
On the Data Complexity of Statistical Attacks Against Block Ciphers(full version)
statistical cryptanalysis iterated block cipher data complexity
2009/6/11
Many attacks on iterated block ciphers rely on statistical considerations using
plaintext/ciphertext pairs to distinguish some part of the cipher from a random permutation. We
provide here a simple ...