搜索结果: 1-14 共查到“军事学 Feistel schemes”相关记录14条 . 查询时间(0.093 秒)
Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256
Generalized Feistel Scheme Quantum attack Simon's algorithm
2019/4/1
Generalized Feistel Schemes (GFS) are important components of symmetric ciphers, which have been extensively researched in classical setting. However, the security evaluations of GFS in quantum settin...
Quantum Cryptanalysis on Some Generalized Feistel Schemes
Generalized Feistel Schemes Simon Grover
2018/1/2
Post-quantum cryptography has attracted much attention from worldwide cryptologists. In ISIT 2010, Kuwakado and Morii gave a quantum distinguisher with polynomial time against 3-round Feistel networks...
Improved Differential Cryptanalysis on Generalized Feistel Schemes
Generalized Feistel Network Differential Analysis Chosen Ciphertext Attack
2017/12/19
Nachef et al used differential cryptanalysis to study four types of Generalized Feistel Scheme (GFS). They gave the lower bound of maximum number of rounds that is indistinguishable from a random perm...
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
Generic attacks on Feistel type schemes pseudo-random permutations differential cryptanalysis
2016/2/23
There are many kinds of attacks that can be mounted on
block ciphers: differential attacks, impossible differential attacks, truncated
differential attacks, boomerang attacks. We consider generic di...
4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes
generic attacks Luby-Rackoff theory block ciphers
2016/1/9
A usual way to construct block ciphers is to apply several
rounds of a given structure. Many kinds of attacks are mounted against
block ciphers. Among them, differential and linear attacks are widel...
Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Block Ciphers Improved Meet-in-the-Middle Attack Efficient Tabulation Technique
2016/1/4
Improved meet-in-the-middle cryptanalysis with efficient tabulation technique has been shown to be a very powerful form of cryptanalysis against SPN block ciphers. However, few literatures show the ef...
Differential Attacks on Generalized Feistel Schemes
generalized Feistel schemes generic attacks on encryption schemes block ciphers
2012/6/14
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and Alt...
Differential Attacks on Generalized Feistel Schemes
secret-key cryptography / generalized Feistel schemes generic attacks on encryption schemes block ciphers
2012/3/20
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and Alt...
Differential Attacks on Generalized Feistel Schemes
generalized Feistel schemes generic attacks on encryption schemes
2012/8/28
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and Alt...
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
secret-key cryptography Luby-Rackoff constructions Balanced random Feistel schemes Unbalanced random Feistel schemes Security Proofs
2010/7/13
In this paper we will study 2 security results \above the birthday bound" related to secret key cryptographic problems.1. The classical problem of the security of 4, 5, 6 rounds balanced Ran-dom Feist...
Generic attacks on Alternating Unbalanced Feistel Schemes
Unbalanced Feistel permutations pseudo-random permutations generic attacks on encryption schemes
2009/6/23
Generic attacks against classical (balanced) Feistel schemes,
unbalanced Feistel schemes with contracting functions and unbalanced
Feistel schemes with expanding functions have been studied in [12],...
Generic Attacks on Feistel Schemes-Extended Version-
Feistel permutations pseudo-random permutations generic attacks on encryption schemes
2009/6/2
Therefore we recommend in Cryptography to use
Feistel schemes with at least 6 rounds in the design of pseudo-random permutations.
We will also show in this paper that it is possible to distinguish m...
In this paper we introduce the method of bi-linear cryptanalysis
(BLC), designed specifically to attack Feistel ciphers. It allows
to construct periodic biased characteristics that combine for an ar...
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Unbalanced Feistel permutations pseudo-random permutations Block ciphers
2008/8/14
Unbalanced Feistel schemes with expanding functions are used to construct pseudo-random permutations from kn bits to kn bits by using random functions from n bits to (k − 1)n bits. At each round...