搜索结果: 1-11 共查到“军队指挥学 RECTANGLE”相关记录11条 . 查询时间(0.062 秒)
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule
Key Recovery Rectangle Attack SKINNY
2019/6/19
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers ...
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES
aes differential cryptanalysis tweakable block cipher
2018/11/12
The rapid distribution of lightweight devices raised the demand for efficient encryption and authenticated encryption schemes for small messages. For this purpose, Andreeva et al. recently proposed fo...
We present various differential fault attack schemes for the RECTANGLE-80 and demonstrate how initially we started from a 80-bit fault to a single word fault scheme. This was mainly due to a different...
RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms
lightweight cryptography block cipher design bit-slice
2016/1/26
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main
idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice
techniques. RECTAN...
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Lightweight block cipher power characteristic FPGA implementation
2016/1/7
Over a decade, cryptographers are more attentive on designing
lightweight ciphers in focus to compact cryptographic devices. More
often, the security of these algorithms are defined in terms of its ...
Related-Key Differential Attack on Round Reduced RECTANGLE-80
RECTANGLE block cipher Mixed-integer linear programming Related-key differential attack
2016/1/5
RECTANGLE is a newly proposed lightweight block cipher which allows fast implementations for multiple platforms by using bit-slice techniques. It is an iterative 25-round SPN block cipher with a 64-bi...
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT
4-bit S-box classification block cipher
2015/12/30
In this paper, we present a new classification of 4-bit optimal S-boxes. All optimal 4-bit Sboxes
can be classified into 183 different categories, among which we specify 3 platinum categories.
Under...
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
Khudra block cipher rectangle attack related-key attack
2015/12/30
\textit{Khudra} is a block cipher proposed in the SPACE'2014 conference, whose main design goal is to achieve suitability for the increasingly popular Field Programmable Gate Array (FPGA) implementati...
Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers
PRINCE LED RECTANGLE bitslice block cipher
2015/12/21
Due to the demand for low-cost cryptosystems from industry, there spring up a lot of lightweight
block ciphers which are excellent for some different implementation features. An innovative design is ...
Related-Key Boomerang and Rectangle Attacks
Related-key Boomerang Attack Related-Key Rectangle Attack AES
2010/1/18
This paper introduces the related-key boomerang and the
related-key rectangle attacks. These new attacks can expand the cryptanalytic
toolbox, and can be applied to many block ciphers. The main
adv...
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
differential cryptanalysis related-key rectangle attack HAS-160
2009/7/14
In this paper we investigate the security of the encryption mode of the HAS-160 hash
function. HAS-160 is a Korean hash standard which is widely used in Korea’s industry. The structure
of HAS-160 is...