搜索结果: 1-15 共查到“Linear Approximations”相关记录16条 . 查询时间(0.125 秒)
Vectorized linear approximations for attacks on SNOW 3G
SNOW 3G Stream Cipher 5G Mobile System Security
2019/9/3
SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standar...
Linear Approximations of Random Functions and Permutations
random function random permutation multinomial distribution
2019/8/19
The goal of this paper is to investigate the behavior of the ideal cipher under linear cryptanalysis. The motivation of this work is twofold. First, before a practical cipher can be distinguished from...
Linear Cryptanalysis Using Low-bias Linear Approximations
Linear cryptanalysis Multiple linear cryptanalysis Multi-key linear cryptanalysis
2017/3/6
This paper deals with linear approximations having absolute bias smaller than 2−n22−n2 which were previously believed to be unusable for a linear attack. We show how a series of observatio...
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
Automatic search tool impossible differential zero-correlation linear
2016/7/13
Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two of the most useful cryptanalysis methods in the field of symmetric ciphers. Until now, there are several automat...
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
multiple linear cryptanalyis LLR statistic chi-squared statistic
2016/4/26
The log-likelihood ratio (LLR) test statistic has been proposed in the literature for performing statistical analysis of attacks on block ciphers. A limitation of the LLR test statistic is that its ap...
Linear Cryptanalysis Using Multiple Linear Approximations
linear cryptanalysis multidimensional cryptanalysis Matsui's
2011/3/10
In this article, the theory of multidimensional linear attacks
on block ciphers is developed and the basic attack algorithms and
their complexity estimates are presented. As an application the mul-
...
Linear Cryptanalysis Using Multiple Linear Approximations
secret-key cryptography / block ciphers cryptanalysis linear cryptanalysis secret-key cryptography
2012/3/29
In this article, the theory of multidimensional linear attacks on block ciphers is developed and the basic attack algorithms and their complexity estimates are presented. As an application the multidi...
Linear Approximations of Addition Modulo 2n-1
Linear approximation modular additions linear cryptanalysis
2010/10/14
Addition modulo $2^{31}-1$ is a basic arithmetic operation in the stream cipher ZUC. For evaluating ZUC in resistance to linear cryptanalysis, it is necessary to study properties of linear approximati...
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
secret-key cryptography Threefish Skein ARX cipher linear cryptanalysis
2010/7/13
The operations addition modulo 2^n and exclusive-or have recently been combined to obtain an efficient mechanism for nonlinearity in block cipher design. In this paper, we show that ciphers using this...
Diagram of measurement series elements deviation from local linear approximations
Diagram measurement series elements deviation local linear approximations
2010/3/18
For the detection and visualization of trends, periodicities, local peculiarities in
measurement series, the methods of fractal and wavelet-analysis are of considerable current use.One of such method...
Spectral clustering based on local linear approximations
Spectral Clustering Higher-Order Affinities Local Linear Approximation Local PolynomialApproximation
2010/3/9
In the context of clustering, we assume a generative model where each cluster is the result
of sampling points in the neighborhood of an embedded smooth surface, possibly contaminated
with outliers....
On Linear Cryptanalysis with Many Linear Approximations (full version)
linear cryptanalysis multiple linear approximations information theory
2009/9/27
In this paper we present a theoretical framework to quan-
tify the information brought by several linear approximations of a block-
cipher without putting any restriction on these approximations.We ...
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Linear Approximations BLUE MIDNIGHT WISH Cryptographic Hash Function
2009/9/27
BLUE MIDNIGHT WISH hash function is the fastest among
14 algorithms in the second round of SHA-3 competition [1]. At the
beginning of this round authors were invited to add some tweaks before
Septe...
On Linear Cryptanalysis with Many Linear Approximations (full version)
linear cryptanalysis multiple linear approximations information theory
2009/9/22
In this paper we present a theoretical framework to quan-
tify the information brought by several linear approximations of a block-
cipher without putting any restriction on these approximations.We ...
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Linear Approximations BLUE MIDNIGHT WISH Cryptographic Hash Function
2009/9/22
BLUE MIDNIGHT WISH hash function is the fastest among
14 algorithms in the second round of SHA-3 competition [1]. At the
beginning of this round authors were invited to add some tweaks before
Septe...