搜索结果: 1-15 共查到“军事学 diffusion”相关记录17条 . 查询时间(0.109 秒)
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
Diffusion Round Feistel Permutations
2019/5/23
The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were then proposed in the literature, leading to the Generalized Feistel Network, where the ...
Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak
side-channel analysis threshold implementation uniformity
2018/11/13
Threshold Implementations are well-known as a provably firstorder secure Boolean masking scheme even in the presence of glitches. A precondition for their security proof is a uniform input distributio...
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer
Skinny block cipher Midori block cipher MILP
2017/3/6
In this paper, we propose an accurate security evaluation methodology for block ciphers with a binary diffusion layers against division cryptanalysis. We illustrate the division property by the indepe...
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
lightweight cryptography diffusion layer near-MDS matrix
2017/3/6
Near-MDS matrices provide better trade-offs between security and efficiency compared to constructions based on MDS matrices, which are favored for hardware-oriented designs. We present new designs of ...
Lightweight Diffusion Layer: Importance of Toeplitz Matrices
Toeplitz matrix MDS matrix XOR count
2016/12/10
MDS matrices are used as building blocks of diffusion layers in block
ciphers, and XOR count is a metric that estimates the hardware implementation cost.
In this paper we report the minimum value of...
Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers
Lightweight Cryptography MDS Diffusion Layers Bit-wise Circulant Matrices
2016/12/7
As a core component of Substitution-Permutation Networks, diffusion layer is mainly introduced by matrices from maximum distance separable (MDS) codes. Surprisingly, up to now, most constructions of M...
Diffusion layers are crucial components of symmetric
ciphers. These components, along with suitable
Sboxes, can make symmetric ciphers resistant against statistical
attacks like linear and differen...
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer
Perfect diffusion Recursive diffusion layer
2016/1/26
Diffusion layers, and specially perfect diffusion layers, are very important
subject for cryptographic research. Main quest is a perfect diffusion
layer with more optimal hardware and/or software im...
Diffusion Programmable Device : The device to prevent reverse engineering
Reverse engineering Countermeasure Diffusion programmable device (DPD)
2016/1/25
The secret information, which is embedded in integrated circuit (IC) devices such as
a smart card, has the risk of theft by reverse engineering (RE). The circuit design of IC
can be stolen by the RE...
Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix
MDS Matrix kth Root of a Matrix Lightweight Diffusion Layer
2016/1/8
The Maximum Distance Separable (MDS) mapping, used in cryptography deploys complex Galois field multiplications, which consume lots of area in hardware, making it a costly primitive for lightweight cr...
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation
Diffusion matrix algebraic-geometry codes algebraic curves
2016/1/8
This paper investigates large linear mappings with very good diffusion and efficient software
implementations, that can be used as part of a block cipher design. The mappings are derived from linear
...
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Recursive MDS Diffusion Layers Shortened BCH Codes
2016/1/8
MDS matrices allow to build optimal linear diffusion layers in
block ciphers. However, MDS matrices cannot be sparse and usually have
a large description, inducing costly software/hardware implement...
Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion
ARX block ciphers hash functions
2016/1/6
This paper explores the approximation of addition mod 2n
by addition mod 2w, where
1 ≤ w ≤ n, in ARX functions that use large words (e.g., 32-bit words or 64-bit words). Three main areas
are explor...
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions
Diffusion layer linear transformation branch numbers
2015/12/30
Many modern block ciphers use maximum distance separate (MDS) matrices as their
diffusion layers. In this paper, we propose a new method to verify a sort of MDS diffusion
block matrices whose blocks...
Indifferentiability of Confusion-Diffusion Networks
symmetric-key cryptography block ciphers substitution-permutation networks
2015/12/29
We show the first positive results for the indifferentiability security of the confusiondiffusion
networks (which are extensively used in the design of block ciphers and hash functions).
In particul...