军事学 >>> 军事学
搜索结果: 1-11 共查到军事学 Round function相关记录11条 . 查询时间(0.046 秒)
To deal with message streams, which is required by many symmetric cryptographic functionalities (MAC, AE, HASH), we propose a lightweight round function called Thin Sponge. We give a framework to cons...
Feistel Networks (FN) are now massively being used to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions,...
We show several constructions based on the AES round function that can be used as building blocks for MACs and authenticated encryption schemes. They are found by a search of the space of all secure...
This paper introduces Simpira, a family of cryptographic permutations that supports inputs of 128 × b bits, where b is a positive integer. Its design goal is to achieve high throughput on virtually ...
We consider ciphertext-only attack on symmetric block ciphers based on the Feistel network with secret S-boxes installed as an additional parameter, like in Soviet GOST 28147-89. In case when S-boxes ...
We consider ciphertext-only attack on symmetric block ciphers based on the Feistel network with secret S-boxes installed as an additional parameter, like in Soviet GOST 28147-89. In case when S-boxes ...
We consider ciphertext-only attack on symmetric block ciphers based on the Feistel network with secret S-boxes installed as an additional parameter, like in Soviet GOST 28147-89. In case when S-boxes ...
At AFRICACRYPT 2010, a parallelized version of the block cipher Camellia, called p-Camellia, was proposed. The high level structure of p-Camellia is MISTY-type, while the round function is SPN-type. I...
On Some Algebraic Structures in the AES Round Function.
cryptanalysis and the pseudorandomness for a class of generalized Feis- tel scheme with SP round function called GFSP. We consider the mini- mum number of active s-boxes in some consecutive rounds o...
In the paper we present the results which enable to calculate the nonlinearity of round functions with quite large dimensions e.g. 32 × 32 bits, which are used in some block ciphers. This can be ap...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...