搜索结果: 1-15 共查到“军事学 PRINCE”相关记录19条 . 查询时间(0.087 秒)
We introduce a new technique for doing the key recovery part
of an integral or higher order differential attack. This technique speeds
up the key recovery phase significantly and can be applied to a...
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
PRESENT PRINCE KATAN64
2016/12/8
This paper presents high-throughput assembly implementations of PRESENT,
PRINCE and KATAN64 ciphers for the ATtiny family of AVR microcontrollers. We report
new throughput records, achieving the spe...
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
PRINCE Subspace Trails Cryptanalysis Invariant Subspace Attack
2016/12/8
Subspace trail cryptanalysis is a very recent new cryptanalysis
technique, and includes differential, truncated differential, impossible
differential, and integral attacks as special cases.
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
Threshold Implementation Transparency Order S-box decomposition
2016/6/20
Lightweight ciphers become indispensable and inevitable in the ubiquitous smart devices. However, the security of ciphers is often subverted by various types of attacks, especially, implementation att...
Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori
Side-Channel Analsysi Masking Threshold Implementation
2016/5/24
During the last years, the industry sector showed particular interest in solutions which allow to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such ciphers are d...
We investigate two attacks on the PRINCE block cipher in
the most realistic scenario, when the attacker only has a minimal amount
of known plaintext available. The first attack is called Accelerated...
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
lightweight cipher PRINCE exhaustive search
2016/2/23
In this paper we focus on the PRINCE block cipher reduced
to 6 rounds, with two known plaintext/ciphertext pairs. We develop two
attacks on 6-round PRINCE based on accelerated exhaustive search,
on...
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE
balanced biclique attack star-based biclique PRINCE
2016/1/27
Inspired by the paper [10], using better differential characteristics in the biclique
construction, we give another balanced biclique attack on full rounds PRINCE with the lower
complexity in this p...
Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)
Differential cryptanalysis PRINCE multiple differentials
2016/1/26
PRINCE is a lightweight block cipher proposed by Borghoff
et al. at Asiacrypt 2012. Due to its originality, novel design and low number
of rounds, it has already attracted the attention of a large n...
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
Homomorphic encryption NTRU Prince lightweight block ciphers
2016/1/23
We present the homomorphic evaluation of the Prince block cipher. Our leveled implementation is based on a generalization of NTRU. We are motivated by the drastic bandwidth savings that may be achie...
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Lightweight block cipher power characteristic FPGA implementation
2016/1/7
Over a decade, cryptographers are more attentive on designing
lightweight ciphers in focus to compact cryptographic devices. More
often, the security of these algorithms are defined in terms of its ...
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
Cryptanalysis block cipher time-memory-data tradeof
2016/1/7
The FX-construction was proposed in 1996 by Kilian and
Rogaway as a generalization of the DESX scheme. The construction increases
the security of an n-bit core block cipher with a κ-bit key by using...
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
PRINCE practical attacks meet-in-the-middle
2016/1/3
NXP Semiconductors and its academic partners challenged the cryptographic community with finding practical attacks on the block cipher they designed, PRINCE. Instead of trying to attack as many rounds...
Practical Attacks on the Round-reduced PRINCE
PRINCE lightweight cryptography integral cryptanalysis
2016/1/3
The PRINCE cipher is the result of a cooperation between the Technical University of
Denmark (DTU), NXP Semiconductors and the Ruhr University Bochum. The cipher was designed
to reach an extremely l...
In this article, we provide the first third-party security analysis of the PRINCE lightweight block
cipher, and the underlying PRINCEcore. First, while no claim was made by the authors regarding rela...