搜索结果: 1-15 共查到“军队指挥学 key recovery attack”相关记录19条 . 查询时间(0.062 秒)
A Refinement of “A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
Trivium Nullification Technique Polynomial Reduction
2018/11/5
At CRYPTO 2018, we proposed a method to reduce the Boolean polynomial of 855-round Trivium. By multiplying a polynomial reduction factor, the output Boolean polynomial is simplified. Based on this met...
A Key-recovery Attack on 855-round Trivium
Trivium Nullification Technique Polynomial Reduction
2018/3/5
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the solution of the s...
Quantum Key-recovery Attack on Feistel Structures
Quantum-CPA Key-recovery Attack Feistel Structure
2017/12/19
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. ...
We present a key-recovery attack against MANTIS-5 with 228228 chosen plaintexts and a computational complexity of about 238238 block cipher calls, which violates this claim. Our attack is based on a f...
We introduce a new technique for doing the key recovery part
of an integral or higher order differential attack. This technique speeds
up the key recovery phase significantly and can be applied to a...
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
CCA-security key-recovery attack post-quantum cryptography
2016/12/10
Algorithms for secure encryption in a post-quantum world are currently receiving a lot of attention in the research community, including several larger projects and a standardization effort from NIST....
In this paper, we propose a guess and determine attack against some variants of the π-Cipher family of authenticated ciphers. This family of ciphers is a second-round candidate of the CAESAR comp...
A realtime key recovery attack on the authenticated cipher FASER128
CAESAR stream ciphers FASER128
2016/1/23
FASER is a family of authenticated ciphers submitted to the CAESAR competition, which contains two parent ciphers: FASER128 and FASER256. In this work we only focus on FASER128 and present a key re...
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Authentication error correcting coding lightweight
2016/1/9
One of the interesting types of RFID application is RFID searching which aims to hear a specific RFID tag from a large group of tags, i.e. ability of detecting whether a target RFID tag is nearby. Ver...
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
MQ cryptography MQQ cryptosystems Equivalent keys
2016/1/6
We investigate the security of the family of MQQ public key cryptosystems using multivariate
quadratic quasigroups (MQQ). These cryptosystems show especially good performance properties.
In particul...
A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme
key recovery attack private key
2016/1/6
In this paper we present a key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme proposed by Bos et al~\cite{NTRUbasedFHE} in 2013. The attack allows us to compu...
Generic Key Recovery Attack on Feistel Scheme
block cipher key scheduling function all-subkeys-recovery attack
2015/12/30
We propose new generic key recovery attacks on Feistel-type block ciphers. The
proposed attack is based on the all subkeys recovery approach presented in SAC 2012, which
determines all subkeys inste...
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes
multivariate cryptography polynomials cryptanalysis
2015/12/29
We present a cryptanalysis of the ASASA public key cipher introduced at Asiacrypt 2014. This scheme alternates three layers of affine transformations A with two layers of quadratic substitutions S. We...
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
Stream Cipher Key Recovery RFID
2012/3/28
In this letter we report on an ultra-efficient key recovery attack under the chosen-plaintext-attack model against the stream cipher A2U2, which is the most lightweight cryptographic primitive (i.e., ...
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
Stream Cipher ey Recovery FID
2011/6/9
In this letter we report on an ultra-efficient key recovery attack under the chosen-plaintext-attack model against the stream cipher A2U2, which is the most lightweight cryptographic primitive (i.e., ...