搜索结果: 1-15 共查到“军事学 probability”相关记录18条 . 查询时间(0.093 秒)
Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation
public-key cryptography lattice techniques
<
2018/11/19
The lattice basis reduction algorithm is a method for solving the Shortest Vector Problem (SVP) on lattices. There are many variants of the lattice basis reduction algorithm such as LLL, BKZ, and RSR....
Exact maximum expected differential and linear probability for 2-round Kuznyechik
Kuznyechik LSX MDS codes
<
2018/11/12
his paper presents the complete description of the best differentials and linear hulls in 2-round Kuznyechik. We proved that 2-round MEDP=2−86.66...MEDP=2−86.66..., MELP=2−76.739...M...
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
Linear cryptanalysis success probability non-monotonicity
<
2018/5/28
Like any other cryptanalytic attack, the success rate of a linear attack is expected to improve as more data becomes available. Bogdanov and Tischhauser (FSE 2013) made the rather surprising claim tha...
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
multidimensional linear cryptanalysis multiple linear cryptanalysis chi-squared distribution
<
2017/8/1
This work considers statistical analysis of attacks on block ciphers using several linear approximations. A general and unified approach is adopted. To this end, the general key randomisation hypothes...
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds
differential cryptanalysis independent S-box fixed key
<
2017/5/31
The current paper studies the probability of differential characteristics for an unkeyed (or with a fixed key) construction. Most notably, it focuses on the gap between two probabilities of differenti...
Another Look at Success Probability in Linear Cryptanalysis
linear cryptanalysis success probability data complexity
<
2017/5/8
This work studies the success probability of linear cryptanalysis. Complete expressions for the success probability are obtained using two different approaches, namely the order statistics and the hyp...
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
Block ciphers Cryptanalysis
<
2016/6/27
The algorithm presented in this paper computes a maximum probability differential characteristic in a Substitution-Permutation Network (or SPN). Such characteristics can be used to prove that a cipher...
Probability that the k-gcd of products of positive integers is B-smooth
gcd of products of positive integers B-smooth k-gcd
<
2016/4/7
In 1849, Dirichlet[5] proved that the probability that two positive integers are relatively prime is 1/zeta(2). Later, it was generalized into the case that positive integers has no nontrivial kth pow...
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
CLEFIA cryptanalysis weak keys
<
2016/1/26
So far, low probability differentials for the key schedule of block ciphers have been used as a straightforward proof of security against related-key differential attacks. To achieve the resistance, i...
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
public-key cryptography / Deniable encryption electronic voting, multi-party computation
<
2012/3/29
Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific cip...
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
Deniable encryption electronic voting multi-party computation
<
2011/2/23
Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific cip...
Differential Probability of Modular Addition with a Constant Operand
differential probability differential cryptanalysis linear function
<
2009/4/16
In this article I analyze the function f(X) = A + X (mod 2a )
exclusive-or differential probability. 1 The result, regarding differential
cryptanalysis, is a better understanding of ciphers that use...
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs
New Method Maximum Average Linear Hull Probability SPNs
<
2009/4/16
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs.
Random Switching Logic: A Countermeasure against DPA based on Transition Probability
Random Switching Logic DPA Transition Probability
<
2009/4/3
In this paper, we propose a new model for directly evaluating DPA leakage from logic
information in CMOS circuits. This model is based on the transition probability for each gate, and is naturally ap...
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard(AES)
AES Rijndael SPN
<
2009/3/5
Provable security of a block cipher against differential / lin-
ear cryptanalysis is based on the maximum expected di®erential / linear
probability (MEDP / MELP) over T 2 core rounds. Over the ...