搜索结果: 1-15 共查到“军队指挥学 stream ciphers”相关记录53条 . 查询时间(0.078 秒)
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Small-state stream cipher Grain Correlation attack
2019/7/15
Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challengin...
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Stream cipher Ultra-lightweight Small-state
2019/6/10
A new generation of stream ciphers, small-state stream ciphers (SSCs), was born in 2015 with the introduction of the Sprout cipher. The new generation is based on using key bits not only in the initia...
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
symmetric cryptography stream cipher correlation attack
2019/3/20
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the met...
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
cryptanalysis time-memory tradeoff attacks block ciphers
2018/2/3
In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Bi...
A Note on Stream Ciphers that Continuously Use the IV
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2017/12/6
Time-memory-data tradeoff (TMD-TO) attacks limit the security level of many classical stream ciphers (like E0E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underly...
Necessary conditions for designing secure stream ciphers with the minimal internal states
Stream Cipher Ultra-lightweight Lightweight
2017/8/10
After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design of stream ciphers by using a secret key, not only in the initialization...
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2017/5/5
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0E0, A5/1, Trivium, Grain) to 12n12n, where nn denotes the inner state length of the underlying...
A SAT-Based Algorithm for Finding Short Cycles in Shift Register Based Stream Ciphers
stream cipher Trivium Grain
2016/12/7
This paper addresses the problem of finding short cycles in the internal state space of shift register based stream ciphers. The absence of short cycles is a desirable property for stream ciphers beca...
Cryptanalysis of the FLIP Family of Stream Ciphers
Stream Cipher Guess-and-determine attack FLIP FHE
2016/3/11
At Eurocrypt 2016, M磂aux et al. proposed FLIP, a new family
of stream ciphers intended for use in Fully Homomorphic Encryption
systems. Unlike its competitors which either have a low initial noise
...
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
Stream Ciphers Homomorphic cryptography
2016/3/9
Symmetric ciphers purposed for Fully Homomorphic Encryption (FHE) have recently been proposed
for two main reasons. First, minimizing the implementation (time and memory) overheads that are inherent ...
Differential Fault Analysis of MICKEY Family of Stream Ciphers
MICKEY-128 2.0 MICKEY v1 MICKEY 2.0
2016/1/23
This paper presents differential fault analysis of the MICKEY family of stream ciphers, one of the winners of eStream project. The current attacks are of the best performance among all the attacks aga...
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers
Guess and Determine attack Stream cipher MICKEY
2016/1/23
By combining the time-memory-data tradeoff (TMDTO) attack independently proposed by Babbage and Goli碿 (BG) with the BSW sampling technique, this paper explores to mount a new TMDTO attack on stream...
Nowadays there are different types of attacks in block and stream ciphers. In
this work we will present some of the most used attacks on stream ciphers. We
will present the newest techniques with an...
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
Stream Ciphers Homomorphic cryptography Ciphertext compression
2016/1/4
In typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HE_pk(m) to some third-party e...