搜索结果: 1-10 共查到“军队指挥学 uniformity”相关记录10条 . 查询时间(0.093 秒)
In order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is known today about...
On the Boomerang Uniformity of some Permutation Polynomials
Vectorial Boolean functions Boomerang uniformity Boomerang connectivity table
2019/8/2
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In particular it takes into consideration two differentials,...
On the boomerang uniformity of quadratic permutations over $\mathbb{F}_{2^n}$
Vectorial functions Block ciphers Boomerang uniformity
2019/3/13
At Eurocrypt'18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of a block cipher against the boomerang attack which ...
New Results about the Boomerang Uniformity of Permutation Polynomials
Finite Field Boomerang Connectivity Table Boomerang Uniformity
2019/1/29
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of S-boxes: Boomerang Connectivity Table (BCT for short) for evaluating the subtleties of boomerang-style attacks. ...
Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$
APN function Differential Uniformity Nyberg's bound
2018/11/2
Little theoretical work has been done on (n,m)(n,m)-functions when n2nn2unctions can be used in Feistel ciphers, and actually play an important role in several block cipher...
We revisit security proofs for various cryptographic primitives in the auxiliary-input random-oracle model (AI-ROM), in which an attacker AA can compute arbitrary SS bits of leakage about the random o...
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
secret-key cryptography cyclic-additive difference sets
2017/6/8
In the preprint [Characterizations of the differential uniformity of vectorial functions by the Walsh transform, IACR ePrint Archive 2017/516], the author has, for each even positive δδ, characterized...
Characterizations of the differential uniformity of vectorial functions by the Walsh transform
secret-key cryptography known APN functions
2017/6/6
For every positive integers nn, mm and every even positive integer δδ, we derive inequalities satisfied by the Walsh transforms of all vectorial (n,m)(n,m)-functions and prove that the case of equalit...
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity
Differentially 44-uniform function Projected differential spectrum Substitution boxes
2016/12/12
Recently, many new classes of differentially 44-uniform permutations have been constructed. However, it is difficult to decide whether they are CCZ-inequivalent or not. In this paper, we propose a new...
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing
DPA countermeasures threshold scheme Keccak
2016/12/7
Since they were first proposed as a countermeasure against differential power analysis (DPA) in 2006, threshold schemes have attracted a lot of attention from the community concentrating on cryptograp...