搜索结果: 1-4 共查到“军队指挥学 Multidimensional Meet-in-the-Middle”相关记录4条 . 查询时间(0.062 秒)
Multidimensional Meet in the Middle Cryptanalysis of KATAN
KATAN Multidimensional Meet in the Middle Attack
2016/2/24
KATAN and KTANTAN are two lightweight families of hardware
oriented block ciphers proposed by Canni`ere et al. at CHES 2009.
They have different versions of 32-, 48- and 64-bit state, all of which
...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
2012/6/14
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST, KTANTAN Hummingbird
2012/3/22
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...
Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2
Multidimensional Meet-in-the-Middle cryptanalysis GOST KTANTAN Hummingbird
2012/3/21
This paper investigates a new approach to analyze symmetric ciphers by dividing the algorithms to consecutive sub-ciphers and then evaluating them separately. This attack is suitable for ciphers with ...