搜索结果: 1-15 共查到“军事学 automatic”相关记录26条 . 查询时间(0.171 秒)
Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)
Division Property Three-Subset STP
2018/12/11
The division property proposed at Eurocrypt'15 is a novel technique to find integral distinguishers, which has been applied to most kinds of symmetric ciphers such as block ciphers, stream ciphers, an...
MILP-Based Automatic Differential Searches for LEA and HIGHT
MILP model Differential Attack ARX ciphers
2018/11/7
In this paper we use MILP technique for automatic search for differential characteristics of ARX ciphers LEA and HIGHT. We show that the MILP model of the differential property of modular addition wit...
Automatic Characterization of Exploitable Faults: A Machine Learning Approach
Security Block Cipher Fault Attack
2017/10/16
Characterization of the fault space of a cipher to filter out a set of faults potentially exploitable for fault attacks (FA), is a problem with immense practical value. A quantitative knowledge of the...
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Automatic search Division property ARX
2017/9/13
Division property is a generalized integral property proposed by Todo at Eurocrypt 2015. Previous tools for automatic searching are mainly based on the Mixed Integer Linear Programming (MILP) method a...
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations
Automatic search tool impossible differential zero-correlation linear
2016/7/13
Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two of the most useful cryptanalysis methods in the field of symmetric ciphers. Until now, there are several automat...
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
Block ciphers Cryptanalysis
2016/6/27
The algorithm presented in this paper computes a maximum probability differential characteristic in a Substitution-Permutation Network (or SPN). Such characteristics can be used to prove that a cipher...
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
automatic search meet-in-the-middle impossible truncated differential
2016/6/7
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at...
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)
Block Ciphers Key-Bridging Technique Automatic Search
2016/5/3
Key schedules in block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. At ASIACRYPT 2011, Dunkelman et al. proposed a technique using the weakness in ...
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
Automatic Search Differential Trail Linear Trail
2016/4/26
In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the sig...
Automatic Search for the Best Trails in ARX:Application to Block Cipher Speck
Symmetric-key Cryptanalysis ARX
2016/4/26
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy, does not use a...
Automatic Differential Analysis of ARX Block Ciphers: with Application to SPECK and LEA
ARX SPECK LEA
2016/3/1
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with respect to XOR-difference, and develop Mouha et al.'s framework of finding differential characteristics by...
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
Generic attacks on Feistel type schemes pseudo-random permutations differential cryptanalysis
2016/2/23
There are many kinds of attacks that can be mounted on
block ciphers: differential attacks, impossible differential attacks, truncated
differential attacks, boomerang attacks. We consider generic di...
Automatic Protocol Selection in Secure Two-Party Computations
Secure Two-Party Computation Performance Optimization
2016/1/25
Performance of secure computation is still often an obstacle to its practical adaption. There
are different protocols for secure computation that compete for the best performance. In this paper we
p...
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
secure computation input privacy active adversary
2016/1/23
We describe an automatic analysis to check secure multiparty computation protocols against privacy leaks. The analysis is sound — a protocol that is deemed private does not leak anything about its p...
Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties
Automatic cryptanalysis Related-key differential cryptanalysis Linear cryptanalysis
2016/1/7
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of
the differential and linear behavior of a wide range of block ciphers. We point out that the differential
behav...