Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
The linear layer is a core component in any substitution-permutation network block cipher.
Its design significantly influences both the security and the efficiency of the resulting block …
Its design significantly influences both the security and the efficiency of the resulting block …
[SÁCH][B] The block cipher companion
LR Knudsen, M Robshaw - 2011 - books.google.com
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the
action of a secret key, and the process of encryption is reversed by decryption which uses …
action of a secret key, and the process of encryption is reversed by decryption which uses …
Cryptanalysis of a white box AES implementation
The white box attack context as described in [1, 2] is the common setting where
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
Differential computation analysis: Hiding your white-box designs is not enough
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …
are broken, there is still a large number of companies which sell “secure” white-box …
On the classification of 4 bit s-boxes
In this paper we classify all optimal 4 bit S-boxes. Remarkably, up to affine equivalence,
there are only 16 different optimal S-boxes. This observation can be used to efficiently …
there are only 16 different optimal S-boxes. This observation can be used to efficiently …
Lightweight AEAD and hashing using the sparkle permutation family
We introduce the Sparkle family of permutations operating on 256, 384 and 512 bits. These
are combined with the Beetle mode to construct a family of authenticated ciphers …
are combined with the Beetle mode to construct a family of authenticated ciphers …
Cryptographic schemes based on the ASASA structure: Black-box, white-box, and public-key
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the …
from symmetric cipher components. We design several encryption schemes based on the …
Protecting white-box AES with dual ciphers
M Karroumi - International conference on information security and …, 2010 - Springer
In order to protect AES software running on untrusted platforms, Chow et al.(2002) designed
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …
[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …
one another in order to exchange information. This information has to be secured …
Cryptanalysis of the **ao–Lai white-box AES implementation
In the white-box attack context, ie, the setting where an implementation of a cryptographic
algorithm is executed on an untrusted platform, the adversary has full access to the …
algorithm is executed on an untrusted platform, the adversary has full access to the …