Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Improving attacks on round-reduced speck32/64 using deep learning
A Gohr - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
This paper has four main contributions. First, we calculate the predicted difference
distribution of Speck32/64 with one specific input difference under the Markov assumption …
distribution of Speck32/64 with one specific input difference under the Markov assumption …
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block …
We propose two systematic methods to describe the differential property of an S-box with
linear inequalities based on logical condition modelling and computational geometry …
linear inequalities based on logical condition modelling and computational geometry …
LEA: A 128-bit block cipher for fast encryption on common processors
D Hong, JK Lee, DC Kim, D Kwon, KH Ryu… - … Workshop, WISA 2013 …, 2014 - Springer
We propose a new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit
key size. It provides a high-speed software encryption on general-purpose processors. Our …
key size. It provides a high-speed software encryption on general-purpose processors. Our …
[HTML][HTML] A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations
Over the years, there has been considerable interest in the area of chaos-based encryption
due to the fact that cryptographic algorithms and chaotic maps share a wide-range of similar …
due to the fact that cryptographic algorithms and chaotic maps share a wide-range of similar …
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
MILP-based automatic search algorithms for differential and linear trails for speck
Abstract In recent years, Mixed Integer Linear Programming (MILP) has been successfully
applied in searching for differential characteristics and linear approximations in block …
applied in searching for differential characteristics and linear approximations in block …
The software performance of authenticated-encryption modes
We study software performance of authenticated-encryption modes CCM, GCM, and OCB.
Across a variety of platforms, we find OCB to be substantially faster than either alternative …
Across a variety of platforms, we find OCB to be substantially faster than either alternative …
Design Strategies for ARX with Provable Bounds: Sparx and LAX
We present, for the first time, a general strategy for designing ARX symmetric-key primitives
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
[PDF][PDF] The skein hash function family
N Ferguson, S Lucks, B Schneier, D Whiting… - Submission to NIST …, 2010 - schneier.com
Skein is a new family of cryptographic hash functions. Its design combines speed, security,
simplicity, and a great deal of flexibility in a modular package that is easy to analyze. Skein …
simplicity, and a great deal of flexibility in a modular package that is easy to analyze. Skein …
Differential Cryptanalysis of Round-Reduced Simon and Speck
This paper presents differential attacks on Simon and Speck, two families of lightweight
block ciphers that were presented by the US National Security Agency in June 2013. We …
block ciphers that were presented by the US National Security Agency in June 2013. We …