搜索结果: 1-7 共查到“军事学 SNOW”相关记录7条 . 查询时间(0.169 秒)
Vectorized linear approximations for attacks on SNOW 3G
SNOW 3G Stream Cipher 5G Mobile System Security
2019/9/3
SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standar...
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
symmetric cryptography stream cipher correlation attack
2019/3/20
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the met...
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment...
Snow White: Provably Secure Proofs of Stake
consensus blockchains cryptocurrency distributed systems
2016/12/8
Decentralized cryptocurrencies have pushed deployments of distributed consensus to more
stringent environments than ever before. Most existing protocols rely on proofs-of-work which
require expensiv...
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0
Stream ciphers Cryptanalysis Large-unit
2016/3/23
Several improvements of fast correlation attacks have been proposed during the past two decades, with a regrettable lack of a better generalization and adaptation to the concrete involved primitives, ...
THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
Cryptanalysis Stream cipher Guess Determine attack
2016/1/8
SNOW 2.0 is a word oriented stream cipher that has been selected as a standard stream cipher on ISO/IEC
18033-4. One of the general attacks on the stream ciphers is Guess and Determine attack. Heuris...
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Cryptography Hardware Accelerator
2014/3/13
With increasing usage of hardware accelerators in modern heterogeneous System-on-Chips (SoCs), the distinction between hardware and software is no longer rigid. The domain of cryptography is no except...