搜索结果: 1-6 共查到“军队指挥学 ARX ciphers”相关记录6条 . 查询时间(0.031 秒)
Differential Cryptanalysis in ARX Ciphers, Applications to LEA
Differential characteristics Nested Monte-Carlo Search ARX ciphers
2018/11/9
In this paper we focus on differential cryptanalysis dedicated to a particular class of cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the Nested Monte-Carlo Sear...
Differential cryptanalysis in ARX ciphers, Application to SPECK
Differential path Nested Monte-Carlo Search ARX ciphers
2018/11/9
In this paper, we propose a new algorithm inspired by Nested to find a differential path in ARX ciphers. In order to enhance the decision process of our algorithm and to reduce the search space of our...
Efficient Side-Channel Protections of ARX Ciphers
Modular Addition Masking Side-channel Analysis
2018/7/20
The current state of the art of Boolean masking for the modular addition operation in software has a very high performance overhead. Firstly, the instruction count is very high compared to a normal ad...
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Automatic search Division property ARX
2017/9/13
Division property is a generalized integral property proposed by Todo at Eurocrypt 2015. Previous tools for automatic searching are mainly based on the Mixed Integer Linear Programming (MILP) method a...
Automatic Search for Differential Trails in ARX Ciphers (Extended Version)
tools for cryptanalysis automatic search
2014/3/5
We propose a tool for automatic search for differential trails in ARX ciphers. By introducing the concept of a partial difference distribution table (pDDT) we extend Matsui's algorithm, originally pro...
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
secret-key cryptography Threefish Skein ARX cipher linear cryptanalysis
2010/7/13
The operations addition modulo 2^n and exclusive-or have recently been combined to obtain an efficient mechanism for nonlinearity in block cipher design. In this paper, we show that ciphers using this...