搜索结果: 1-15 共查到“PRINCE”相关记录95条 . 查询时间(0.093 秒)
Effects of Long-Term Successive Rotations, Clear-Cutting and Stand Age of Prince Rupprecht’s larch (Larix principis-rupprechtii Mayr) on Soil Quality
soil quality successive planting generation stand age clear-cutting Larix principis-rupprechtii Mayr
2024/2/28
A decline in soil quality is a major factor contributing to the degradation of forest ecological function. Vegetation plays a vital role in maintaining soil quality; however, the influence of plantati...
We introduce a new technique for doing the key recovery part
of an integral or higher order differential attack. This technique speeds
up the key recovery phase significantly and can be applied to a...
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
PRESENT PRINCE KATAN64
2016/12/8
This paper presents high-throughput assembly implementations of PRESENT,
PRINCE and KATAN64 ciphers for the ATtiny family of AVR microcontrollers. We report
new throughput records, achieving the spe...
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
PRINCE Subspace Trails Cryptanalysis Invariant Subspace Attack
2016/12/8
Subspace trail cryptanalysis is a very recent new cryptanalysis
technique, and includes differential, truncated differential, impossible
differential, and integral attacks as special cases.
USING REMOTE SENSING AND GIS TECHNIQUES TO DETECT CHANGES TO THE PRINCE ALFRED HAMLET CONSERVATION AREA IN THE WESTERN CAPE,SOUTH AFRICA
Change Detection Remote Sensing Biodiversity Wetland Conservation
2016/11/23
Understanding and identifying the spatial-temporal changes in the natural environment is crucial for monitoring and evaluating conservation efforts, as well as understanding the impact of human activi...
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
Threshold Implementation Transparency Order S-box decomposition
2016/6/20
Lightweight ciphers become indispensable and inevitable in the ubiquitous smart devices. However, the security of ciphers is often subverted by various types of attacks, especially, implementation att...
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Side-Channel Analsysi Masking Threshold Implementation
2016/5/24
During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are d...
We investigate two attacks on the PRINCE block cipher in
the most realistic scenario, when the attacker only has a minimal amount
of known plaintext available. The first attack is called Accelerated...
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
lightweight cipher PRINCE exhaustive search
2016/2/23
In this paper we focus on the PRINCE block cipher reduced
to 6 rounds, with two known plaintext/ciphertext pairs. We develop two
attacks on 6-round PRINCE based on accelerated exhaustive search,
on...
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
balanced biclique attack star-based biclique PRINCE
2016/1/27
Inspired by the paper [10], using better differential characteristics in the biclique
construction, we give another balanced biclique attack on full rounds PRINCE with the lower
complexity in this p...
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
Differential cryptanalysis PRINCE multiple differentials
2016/1/26
PRINCE is a lightweight block cipher proposed by Borghoff
et al. at Asiacrypt 2012. Due to its originality, novel design and low number
of rounds, it has already attracted the attention of a large n...
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
Homomorphic encryption NTRU Prince lightweight block ciphers
2016/1/23
We present the homomorphic evaluation of the Prince block cipher. Our leveled implementation is based on a generalization of NTRU. We are motivated by the drastic bandwidth savings that may be achie...
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Lightweight block cipher power characteristic FPGA implementation
2016/1/7
Over a decade, cryptographers are more attentive on designing
lightweight ciphers in focus to compact cryptographic devices. More
often, the security of these algorithms are defined in terms of its ...
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Cryptanalysis block cipher time-memory-data tradeof
2016/1/7
The FX-construction was proposed in 1996 by Kilian and
Rogaway as a generalization of the DESX scheme. The construction increases
the security of an n-bit core block cipher with a κ-bit key by using...
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
PRINCE practical attacks meet-in-the-middle
2016/1/3
NXP Semiconductors and its academic partners challenged the cryptographic community with finding practical attacks on the block cipher they designed, PRINCE. Instead of trying to attack as many rounds...