咨询与建议

限定检索结果

文献类型

  • 105 篇 会议
  • 99 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 180 篇 计算机科学与技术...
    • 53 篇 电气工程
    • 29 篇 软件工程
    • 26 篇 电子科学与技术(可...
    • 13 篇 信息与通信工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
  • 72 篇 理学
    • 70 篇 数学
    • 5 篇 科学技术史(分学科...
    • 3 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 8 篇 公共管理
    • 2 篇 管理科学与工程(可...
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 207 篇 linear cryptanal...
  • 70 篇 differential cry...
  • 46 篇 block cipher
  • 21 篇 block ciphers
  • 14 篇 cryptography
  • 12 篇 des
  • 10 篇 cryptanalysis
  • 8 篇 s-box
  • 8 篇 simon
  • 7 篇 linear approxima...
  • 7 篇 linear hull
  • 6 篇 present
  • 6 篇 key recovery
  • 6 篇 provable securit...
  • 5 篇 t-310
  • 5 篇 differential-lin...
  • 5 篇 aes
  • 5 篇 correlation
  • 5 篇 serpent
  • 5 篇 milp

机构

  • 7 篇 chinese acad sci...
  • 6 篇 shandong univ ke...
  • 5 篇 inria
  • 5 篇 katholieke univ ...
  • 4 篇 iminds leuven
  • 4 篇 univ chinese aca...
  • 4 篇 korea univ cist
  • 4 篇 katholieke univ ...
  • 3 篇 shanghai jiao to...
  • 3 篇 shandong univ sc...
  • 3 篇 ecole polytech f...
  • 3 篇 univ electrocomm...
  • 3 篇 tech univ denmar...
  • 3 篇 shandong univ mi...
  • 3 篇 tsinghua univ de...
  • 3 篇 inst res fundame...
  • 2 篇 gemalto
  • 2 篇 queens univ dept...
  • 2 篇 politecn milan i...
  • 2 篇 zhejiang univ me...

作者

  • 12 篇 nyberg kaisa
  • 10 篇 bogdanov andrey
  • 8 篇 wang meiqin
  • 6 篇 ashur tomer
  • 6 篇 aoki k
  • 6 篇 rijmen vincent
  • 6 篇 beyne tim
  • 5 篇 leander gregor
  • 4 篇 ohta k
  • 4 篇 blondeau celine
  • 4 篇 lu yi
  • 4 篇 matsui m
  • 4 篇 hermelin miia
  • 4 篇 zhang wentao
  • 3 篇 moriai s
  • 3 篇 wu wenling
  • 3 篇 hu lei
  • 3 篇 yuan jian
  • 3 篇 sakiyama kazuo
  • 3 篇 florez-gutierrez...

语言

  • 204 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"主题词=Linear cryptanalysis"
207 条 记 录,以下是1-10 订阅
排序:
Improved machine learning-aided linear cryptanalysis: application to DES
收藏 引用
CYBERSECURITY 2025年 第1期8卷 1-16页
作者: Hou, Zezhou Ren, Jiongjiong Chen, Shaozhen Informat Engn Univ Zhengzhou 450000 Peoples R China
In CRYPTO 2019, Gohr built a bridge between machine learning and differential cryptanalysis, which show that machine learning-aided methods have advantages over classical differential cryptanalysis. Yet, for linear cr... 详细信息
来源: 评论
linear cryptanalysis of reduced-round SPECK
收藏 引用
INFORMATION PROCESSING LETTERS 2016年 第3期116卷 259-266页
作者: Liu, Yu Fu, Kai Wang, Wei Sun, Ling Wang, Meiqin Shandong Univ Key Lab Cryptol Technol & Informat Secur Minist Educ Jinan 250100 Peoples R China
SPECK is a family of lightweight block ciphers which was proposed by United States National Security Agency and designed for optimal performance in software. The paper gives the security of SPECK against linear crypta... 详细信息
来源: 评论
linear cryptanalysis of PRESENT-like Ciphers with Secret Permutation
收藏 引用
COMPUTER JOURNAL 2016年 第4期59卷 549-558页
作者: Liu, Guo-Qiang Jin, Chen-Hui Natl Univ Def Technol Coll Sci Dept Math & Syst Sci Changsha 410073 Hunan Peoples R China Informat Sci & Technol Inst Zhengzhou 450000 Henan Peoples R China
This paper investigates the linear cryptanalysis of PRESENT-like cipher with secret permutation. Our contributions are 3-fold. First, we construct a distinguisher with more advantages by combining with 240 distinguish... 详细信息
来源: 评论
linear cryptanalysis of NUSH block cipher
收藏 引用
Science in China(Series F) 2002年 第1期45卷 59-67页
作者: 吴文玲 冯登国 StateKeyLaboratoryofInformationSecurity InstituteofSoftwareChineseAcademyofSciencesBeijing100080China/EngineeringResearchCenterforInformationSecurityTechnologyChineseAcademyofSciencesBeijing100080China EngineeringResearchCenterforInformationSecurityTechnology ChineseAcademyofSciencesBeijing100080China
NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis . The complexity δ = (ε , η) of the attack consists of data complexity ε and time complexity η. Three linear approximati... 详细信息
来源: 评论
linear cryptanalysis of Baby Rijndael  4
Linear Cryptanalysis of Baby Rijndael
收藏 引用
2015 Forth International Conference on e-Technologies and Networks for Development
作者: Kokes, Josef Lorencz, Robert Czech Tech Univ Fac Informat Technol Thakurova 9 Prague 16000 6 Czech Republic
We present results of linear cryptanalysis of Baby Rijndael, a reduced-size model of Rijndael. The results were obtained using exhaustive search of all approximations and all keys and show some curious properties of b... 详细信息
来源: 评论
linear cryptanalysis of the PP-1 and PP-2 Block Ciphers  15
Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers
收藏 引用
15th International Conference on Cryptology in India (INDOCRYPT)
作者: Colburn, Michael Keliher, Liam Mt Allison Univ AceCrypt Res Grp Sackville NB E0A 3C0 Canada
PP-1 and PP-2 are scalable SPN-based block ciphers introduced in 2008 and 2013, respectively. PP-2 was intended as an improvement to PP-1, which was broken in 2011 using differential cryptanalysis. The designers of PP... 详细信息
来源: 评论
linear cryptanalysis of FF3-1 and FEA  41st
Linear Cryptanalysis of FF3-1 and FEA
收藏 引用
41st Annual International Cryptology Conference (CRYPTO)
作者: Beyne, Tim Katholieke Univ Leuven IMEC COSIC Leuven Belgium
Improved attacks on generic small-domain Feistel ciphers with alternating round tweaks are obtained using linear cryptanalysis. This results in practical distinguishing and message-recovery attacks on the United State... 详细信息
来源: 评论
linear cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for linear Trails  21st
Linear Cryptanalysis of Reduced-Round Speck with a Heuristic...
收藏 引用
21st International Information Security Conference (ISC)
作者: Bodden, Daniel Katholieke Univ Leuven IMEC COSIC Leuven Belgium
Previous research on linear cryptanalysis with Speck has proved that good linear trails and a meaningful distinguisher for variants of Speck can be found. In this paper we use two different linear approximations of mo... 详细信息
来源: 评论
linear cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-Based Ciphers  28th
Linear Cryptanalysis and Its Variants with Fast Fourier Tran...
收藏 引用
28th Australasian Conference on Information Security and Privacy (ACISP)
作者: Xu, Zeyu Chen, Shiyao Wang, Meiqin Wei, Puwen Shandong Univ Key Lab Cryptol Technol & Informat Secur Minist Educ Jinan Peoples R China Shandong Univ Sch Cyber Sci & Technol Qingdao Peoples R China Nanyang Technol Univ Strateg Ctr Res Privacy Preserving Technol & Syst Singapore Singapore Quan Cheng Shandong Lab Jinan Peoples R China
The emergence of advanced cryptographic protocols has promoted the developments of many applications, such as secure multiparty computation (MPC). For this reason, new symmetric-key primitives have been designed to na... 详细信息
来源: 评论
linear cryptanalysis Reduced Round of Piccolo-80  1
收藏 引用
3rd International Symposium on Cyber Security Cryptography and Machine Learning (CSCML)
作者: Ashur, Tomer Dunkelman, Orr Masalha, Nael Katholieke Univ Leuven Dept Elect Engn ESAT COSIC Leuven Belgium IMinds Leuven Belgium Univ Haifa Dept Comp Sci Haifa Israel
Piccolo is a 64-bit lightweight block cipher suitable for constrained environments such as wireless sensor networks. In this paper we evaluate the security of Piccolo-80 against linear cryptanalysis, we present a 6-ro... 详细信息
来源: 评论