搜索结果: 1-15 共查到“军队指挥学 boomerang”相关记录21条 . 查询时间(0.066 秒)
In order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is known today about...
On the Boomerang Uniformity of some Permutation Polynomials
Vectorial Boolean functions Boomerang uniformity Boomerang connectivity table
2019/8/2
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In particular it takes into consideration two differentials,...
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
Boomerang connectivity table GIFT Automatic search
2019/6/10
In Eurocrypt 2018, Cid et al. proposed a novel notion called the boomerang connectivity table, which formalised the switch property in the middle round of boomerang distinguishers in a unified approac...
On the boomerang uniformity of quadratic permutations over $\mathbb{F}_{2^n}$
Vectorial functions Block ciphers Boomerang uniformity
2019/3/13
At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against the boomerang attack which ...
New Results about the Boomerang Uniformity of Permutation Polynomials
Finite Field Boomerang Connectivity Table Boomerang Uniformity
2019/1/29
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of S-boxes: Boomerang Connectivity Table (BCT for short) for evaluating the subtleties of boomerang-style attacks. ...
Recently, the Boomerang Connection Table was introduced by Cid et al.~as a tool to better evaluate the probability of a boomerang distinguisher. To compute the BCT of an nn-bit to nn-bit S-box, the in...
With the BCT, previous observations on the S-box including the incompatibility, the ladder switch and the S-box switch are represented in a unified manner. Moreover, the BCT can detect a new switching...
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
cryptanalysis tweakable block cipher
2016/12/29
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except for the tweak, which renders it a...
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Boomerang Differential Trails SAT-Based Constraint Solver URSA
2016/1/8
In order to obtain differential patterns over many rounds of a cryptographic primitive,
the cryptanalyst often needs to work on local differential trail analysis. Examples include
merging two differ...
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash
function family issued by the National Institute of Standards and Technology
(NIST) in 2002 and is widely used all over the world. In this work,...
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against
the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2,
and compare their c...
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
hash function BLAKE SM3 boomerang attack
2014/3/5
In this paper we study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Offi...
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
Differential Cryptanalysis Related-Key Boomerang Attack
2014/3/6
The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers.
In th...
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
Skein Differential analysis Related key Boomerang attack
2012/3/27
On Nov 2007, NIST announced the SHA-3 competition to select a new hash standard as a replacement of SHA-2. On Dec 2010, five submissions have been selected as the final round candidates, including Ske...
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
Related-key attacks differential cryptanalysis boomerang attacks AES key schedule
2011/2/23
In this paper, we summarize the recent related-key differential and boomerang attacks on AES by Biryukov et al. and present a framework for protection against these attacks. Then we study an alternati...