搜索结果: 1-9 共查到“军事学 Parity”相关记录9条 . 查询时间(0.088 秒)
Improved Distinguisher Search Techniques Based on Parity Sets
Division property Parity set Integral attacks
2018/5/22
Division property is a distinguishing property against block ciphers proposed by Todo at EURO- CRYPT 2015. To give a new approach to division property, Christina et al. proposed a new notion called th...
Learning Parity with Noise Implies Collision Resistant Hashing
Learning Parity with Noise Collision Resistant Hashing binary Shortest Vector Problem
2018/1/2
In addition to the feasibility established, we discuss also the practical relevance of the CRH functions constructed (from the hardness of LPN). Interestingly, the SHA-3 proposal Fast Syndrome Based (...
The INT-RUP Security of OCB with Intermediate (Parity) Checksum
OCB, INT-RUP nonce-misuse checksum
2016/12/7
OCB is neither integrity under releasing unvieried plaintext (INT-RUP) nor nonce-misuse resistant. The tag of OCB is generated by encrypting plaintext checksum, which is vulnerable in the INT-RUP sec...
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning
Parity Learning bounded storage model
2016/2/22
We prove that any algorithm for learning parities requires either a memory of
quadratic size or an exponential number of samples. This proves a recent conjecture
of Steinhardt, Valiant and Wager [SV...
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
side-channel analysis fault attacks parity check countermeasure
2015/12/23
In this paper we study a parity check based countermeasure proposed by Chen
et al. that thwarts their attack by detecting byte fault injection during the AES key schedule
process.
Tree Parity Machine Rekeying Architectures
K.4.4.f Security K.6.5.a Authentication B.7.1.b Algorithms implemented in hardware
2009/3/27
The necessity to secure the communication between hardware components in embedded systems
becomes increasingly important with regard to the secrecy of data and particularly its commercial use.
We su...
Authenticated tree parity machine key exchange
Authenticated tree parity machine key exchange
2009/3/27
Authenticated tree parity machine key exchange.
Tree Parity Machine Rekeying Architectures for Embedded Security
Tree Parity Machine Rekeying Architectures Embedded Security pervasive computing
2009/2/19
Tree Parity Machine Rekeying Architectures for Embedded Security.
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
Lightweight Key Exchange Stream Cipher Tree Parity Machines
2009/2/18
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines.