搜索结果: 1-15 共查到“军事学 non linear”相关记录17条 . 查询时间(0.14 秒)
Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures
KECCAK SHA-3 Hash function
2019/8/2
In this paper, we present new preimage attacks on KECCAK-384 and KECCAK-512 for 2, 3 and 4 rounds. The attacks are based on non-linear structures (structures that contain quadratic terms). These struc...
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
block ciphers Boolean functions Algebraic Normal Form
2018/11/19
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt’95 (adapted to Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making such attacks wo...
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC
Block cipher LowMC Picnic signature algorithm linear equivalence
2018/8/28
LowMC is a block cipher family that is optimized for practical instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. It was designed in 2015 by Albrecht e...
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017
Public-Key Encryption Indeterminate Equations Cryptosystem Post-quantum cryptography
2017/12/25
Abstract. We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosystem (IEC), introduced by Akiyama, Goto, Okumura, Takagi, Nuida, and Hanaoka at SAC 2017 as ...
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)
Public-key Cryptosystem Post-Quantum Cryptosystem Indeterminate Equation
2017/12/25
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a problem arising from a multivariate non-linear indeterminate equation. The security of lattice cryptos...
Image Classification using non-linear Support Vector Machines on Encrypted Data
cryptographic protocols SHE
2017/9/13
In image processing, algorithms for object classification are typically based around machine learning. From the algorithm developer's perspective, these can involve a considerable amount of effort and...
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently
Stream ciphers Grain-128 Polynomial reduction
2017/5/15
In this paper, we propose a reduction technique that can be used to determine the density of IV terms of a complex multivariable boolean polynomial. Using this technique, we revisit the dynamic cube a...
Reducing the Number of Non-linear Multiplications in Masking Schemes
side-channel countermeasure masking probing security
2016/12/10
In recent years, methods to securely mask S-boxes against side-channel attacks by representing them as polynomials over finite binary fields have become quite efficient. A good cost model for this is ...
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Ring LWE Bilinear Maps Identity-Based Encryption
2016/12/10
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing property of the schemes is that it achieves shorter public parameters than previous s...
Cryptanalysis of SP Networks with Partial Non-Linear Layers
Block cipher Lightweight Zorro
2016/1/23
Design of SP networks in which the non-linear layer is applied to only a part of the state in each round was suggested by Gérard et al.~at CHES 2013. Besides performance advantage on certain platforms...
Modified Alternating Step Generators with Non-Linear Scrambler
stream ciphers alternating step generators linear/nonlinear feedback shift registers
2016/1/5
Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive-or sum
of output bits from alternately clocked linear feedback shift registers, are vulnerable to cryptanalysis. ...
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
XLS CMC Luby-Rackof
2015/12/31
It is well known that three and four rounds of balanced Feistel
cipher or Luby-Rackoff (LR) encryption for two blocks messages are
pseudorandom permutation (PRP) and strong pseudorandom permutation
...
An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
FHE homomorphic cryptosystem
2014/3/13
We propose a general framework to develop fully homomorphic encryption schemes (FHE) without using the Gentry's technique. The security relies on the difficulty of solving systems of non-linear equati...
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields
MQ problem Algebraic Attacks Equation Solver
2012/6/14
Solving non-linear and in particular Multivariate Quadratic equations over finite fields is an important cryptanalytic problem. Apart from needing exponential time in general, we also need very large ...
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields
implementation / MQ problem Algebraic Attacks Equation Solver F5 Buchberger
2012/3/20
Solving non-linear and in particular Multivariate Quadratic equations over finite fields is an important cryptanalytic problem. Apart from needing exponential time in general, we also need very large ...