搜索结果: 1-8 共查到“AES-256”相关记录8条 . 查询时间(0.187 秒)
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
side-channel cache attacks
2018/6/25
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and ofte...
改进的7轮AES-192和8轮AES-256的中间相遇攻击
AES 中间相遇攻击 时间复杂 密码算法
2012/4/17
利用AES密码算法轮变换的特点,构造了一个5轮中间相遇攻击区分器的新变体。基于该区分器变体,使用时空折中方法,针对7轮AES-192和8轮AES-256分别给出了新的攻击方法。研究结果表明,与FSE2008提出的针对AES的中间相遇攻击结果比较,新分析所需的时间复杂度和存储复杂度降低。
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
DFA fault injection AES-192 AES-256 adaptation extension reproduction
2010/7/14
Since its announcement, AES has been subject to different DFA attacks. Most of these attacks target the AES with 128-bit key. However, the two other variants are nowadays deployed in various applicati...
Related-key Cryptanalysis of the Full AES-192 and AES-256
Related-key Cryptanalysis Full AES-192 AES-256
2009/7/14
In this paper we present two related-key attacks on the full
AES. For AES-256 we show the first key recovery attack that works
for all the keys and has complexity 2119, while the recent attack by
B...
Examples of differential multicollisions for 13 and 14 rounds of AES-256
differential multicollisions AES-256 active S-box
2009/6/15
Here we present practical differential q-multicollisions for AES-256. In our
paper [1] q-multicollisions are found with complexity q 267. We relax conditions
on the plaintext difference P allowing ...
Distinguisher and Related-Key Attack on the Full AES-256(Extended Version)
AES related-key attack chosen key distinguisher
2009/6/15
In this paper we construct a chosen-key distinguisher and a related-key attack
on the full 256-bit key AES. We dene a notion of dierential q-multicollision and show that
for AES-256 q-multicollisi...
On the complexity of side-channel attacks on AES-256 methodology and quantitative results on cache attacks -
side-channel cache attacks AES-192 AES-256 symmetric key cipher
2008/5/30
Larger key lengths translate into an exponential increase in the complexity of an exhaustive search. Side-channel attacks, however, use a divide-and-conquer approach and hence it is generally assumed ...