搜索结果: 1-13 共查到“军事学 M-32”相关记录13条 . 查询时间(0.211 秒)
Many crypto-algorithms, Deep-Learning, DSP compute on words larger than 8-bit. SCA attacks can easily be done on Boolean operations like XOR, AND, OR, and substitution operations like s-box, p-box or ...
This paper presents the results of a new approach to the cryptanalysis of SIMON-32/6432/64, a cipher published by NSA in 2013. Our cryptanalysis essentially considers combinatorial properties. These p...
Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller
Fault attack laser injection flash memory
2018/11/2
Physical attacks are a known threat to secure embedded systems. Notable among these is laser fault injection, which is probably the most powerful fault injection technique. Indeed, powerful injection ...
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64
Correlated sequences Simon Simeck
2018/8/2
In this paper, we propose a novel cryptanalytic technique called correlated sequence attack on block ciphers. Our attack exploits the properties of given key dependent sequences of length tt to obtain...
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Microcontroller Message Authentication Code Standard Model Security
2016/1/9
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm
for 32-bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot
implement stan...
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
elliptic curve cryptography Curve25519 ECDH key-exchange
2015/12/31
This paper presents new speed records for 128-bit secure elliptic-curve Diffie-Hellman key-exchange software on three different popular microcontroller architectures. We consider a 255-bit curve propo...
Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
SIMON linear cryptanalysis linear hull
2015/12/22
In this paper we analyse two variants of SIMON family of light-weight block ciphers
against linear cryptanalysis and present the best linear cryptanalytic results on these variants of
reduced-round ...
RC4 has remained the most popular software stream cipher since the last two decades. In parallel to cryptanalytic attempts, researchers have come up with many variants of RC4, some targeted to more se...
Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
SHA-3 BLAKE fully autonomous implementation compact im-plementation FPGA
2010/4/7
We propose compact architectures of the SHA-3 candidates
BLAKE-32 and BLAKE-64 for several FPGA families. We harness the
intrinsic parallelism of the algorithm to interleave the computation of
four...
Cryptanalysis of a 32-bit RC4-like Stream Cipher
Cryptanalysis 32-bit RC4-like Stream Cipher keystream
2009/2/17
Nawaz, Gupta and Gong recently proposed a 32-bit RC4-like
stream cipher. In this paper, we show that the keystream generated from
their stream cipher is not random. The keystream can be distinguishe...
A 32-bit RC4-like Keystream Generator
RC4 stream ciphers random shuffle keystream generator
2009/2/11
In this paper we propose a new 32-bit RC4 like keystream
generator. The proposed generator produces 32 bits in each iteration and
can be implemented in software with reasonable memory requirements.
...
印度尼西亚购买32辆军用车辆派往黎巴嫩参加维和行动
印度尼西亚 军用车辆 黎巴嫩 维和行动
2006/10/16
2006年10月10日,印度尼西亚花费3112万美元购买了32辆法制军用车辆,将装备于印尼驻黎巴嫩的维和部队。另据印尼国防部秘书长透露,合同中包括24辆轮式装甲人员输送车,2辆突击车和6辆军用救护车,以及为印尼陆军目前装备的14辆法制装甲人员运输车提供临时性的零备件和技术援助。
约旦推出新型RPG-32 “哈希姆”火箭筒
火箭筒 RPG-32
2006/4/11
[英国《简氏防务周刊》2006年4月5日报道] 约旦-俄罗斯电子系统公司(JRESCO)披露,已经研制出RPG-32式“哈希姆”105毫米火箭筒。该公司由约旦阿卜杜拉二世设计与研究局和俄罗斯Rosboronexport国防出口局联合创建。