搜索结果: 1-14 共查到“军队指挥学 Linear Approximations”相关记录14条 . 查询时间(0.078 秒)
Vectorized linear approximations for attacks on SNOW 3G
SNOW 3G Stream Cipher 5G Mobile System Security
2019/9/3
SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standar...
Linear Approximations of Random Functions and Permutations
random function random permutation multinomial distribution
2019/8/19
The goal of this paper is to investigate the behavior of the ideal cipher under linear cryptanalysis. The motivation of this work is twofold. First, before a practical cipher can be distinguished from...
Linear Cryptanalysis Using Low-bias Linear Approximations
Linear cryptanalysis Multiple linear cryptanalysis Multi-key linear cryptanalysis
2017/3/6
This paper deals with linear approximations having absolute bias smaller than 2−n22−n2 which were previously believed to be unusable for a linear attack. We show how a series of observatio...
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
Automatic search tool impossible differential zero-correlation linear
2016/7/13
Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two of the most useful cryptanalysis methods in the field of symmetric ciphers. Until now, there are several automat...
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
multiple linear cryptanalyis LLR statistic chi-squared statistic
2016/4/26
The log-likelihood ratio (LLR) test statistic has been proposed in the literature for performing statistical analysis of attacks on block ciphers. A limitation of the LLR test statistic is that its ap...
Linear Cryptanalysis Using Multiple Linear Approximations
linear cryptanalysis multidimensional cryptanalysis Matsui's
2011/3/10
In this article, the theory of multidimensional linear attacks
on block ciphers is developed and the basic attack algorithms and
their complexity estimates are presented. As an application the mul-
...
Linear Cryptanalysis Using Multiple Linear Approximations
secret-key cryptography / block ciphers cryptanalysis linear cryptanalysis secret-key cryptography
2012/3/29
In this article, the theory of multidimensional linear attacks on block ciphers is developed and the basic attack algorithms and their complexity estimates are presented. As an application the multidi...
Linear Approximations of Addition Modulo 2n-1
Linear approximation modular additions linear cryptanalysis
2010/10/14
Addition modulo $2^{31}-1$ is a basic arithmetic operation in the stream cipher ZUC. For evaluating ZUC in resistance to linear cryptanalysis, it is necessary to study properties of linear approximati...
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
secret-key cryptography Threefish Skein ARX cipher linear cryptanalysis
2010/7/13
The operations addition modulo 2^n and exclusive-or have recently been combined to obtain an efficient mechanism for nonlinearity in block cipher design. In this paper, we show that ciphers using this...
On Linear Cryptanalysis with Many Linear Approximations (full version)
linear cryptanalysis multiple linear approximations information theory
2009/9/27
In this paper we present a theoretical framework to quan-
tify the information brought by several linear approximations of a block-
cipher without putting any restriction on these approximations.We ...
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Linear Approximations BLUE MIDNIGHT WISH Cryptographic Hash Function
2009/9/27
BLUE MIDNIGHT WISH hash function is the fastest among
14 algorithms in the second round of SHA-3 competition [1]. At the
beginning of this round authors were invited to add some tweaks before
Septe...
On Linear Cryptanalysis with Many Linear Approximations (full version)
linear cryptanalysis multiple linear approximations information theory
2009/9/22
In this paper we present a theoretical framework to quan-
tify the information brought by several linear approximations of a block-
cipher without putting any restriction on these approximations.We ...
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Linear Approximations BLUE MIDNIGHT WISH Cryptographic Hash Function
2009/9/22
BLUE MIDNIGHT WISH hash function is the fastest among
14 algorithms in the second round of SHA-3 competition [1]. At the
beginning of this round authors were invited to add some tweaks before
Septe...
On Multiple Linear Approximations
Linear cryptanalysis multiple linear approximations stochastic systems of linear equations
2009/3/24
In this paper we study the long standing problem of information extraction
from multiple linear approximations. We develop a formal statistical framework for block
cipher attacks based on this techn...