搜索结果: 1-7 共查到“军事学 Sboxes”相关记录7条 . 查询时间(0.078 秒)
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
AES SBox circuit area circuit depth
2019/7/15
In this paper we consider various methods and techniques to find the smallest circuit realizing a given linear transformation on nn input signals and mm output signals, with a constraint of a maximum ...
In this work, we discuss two notions of differential equivalence on Sboxes. First, we introduce the notion of DDT-equivalence which applies to vectorial Boolean functions that share the same differenc...
Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
boolean functions Sbox side-channel attacks
2016/12/8
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms in order to extract sensitive information such as the secret key. These physical attacks are among ...
Strong 8-bit Sboxes with Efficient Masking in Hardware
side-channel analysis threshold implementation 8-bit Sboxes
2016/6/27
Block ciphers are arguably the most important cryptographic primitive in practice. While their security against mathematical attacks is rather well understood, physical threats such as side-channel an...
Faster Evaluation of SBoxes via Common Shares
Side-channel attacks ISW countermeasure masking
2016/6/6
We describe a new technique for improving the efficiency of the masking countermeasure
against side-channel attacks. Our technique is based on using common shares between secret variables,
in order ...
On the behaviors of affine equivalent Sboxes regarding differential and linear attacks
Sboxes affine equivalence differential cryptanalysis
2016/1/4
This paper investigates the effect of affine transformations of the Sbox on the maximal expected differential probability MEDP and linear potential MELP over two rounds of a substitution-permutation n...
Generalization of Statistical Criteria for Sboxes
Linear Crytptanaslysis Differential Cryptanalysis Differential-Linear Cryptanalysis
2016/1/4
Linear and differential cryptanalysis and their generalizations are
the most important tools in statistical analysis of symmetric ciphers. These
attacks make use of linear and differential propertie...