Many cryptanalytic techniques for symmetric-key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext-ciphertext pairs. For example, ...
详细信息
Many cryptanalytic techniques for symmetric-key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext-ciphertext pairs. For example, there is a standard statistical model for differential cryptanalysis that determines the success probability and complexity of the attack given some predefined configurations of the attack. In this work, we investigate the differential attack proposed by Guo et al. at Fast Software Encryption Conference 2020 and find that in this attack, the statistical behavior of the counters for key candidates deviate from standard scenarios, where both the correct key and the correct key xor specific difference are expected to receive the largest number of votes. Based on this bimodal behavior, we give three different statistical models for truncated differential distinguisher on CRAFT(a cryptographic algorithm name) for bimodal phenomena. Then, we provide the formulas about the success probability and data complexity for different models under the condition of a fixed threshold value. Also, we verify the validity of our models for bimodal phenomena by experiments on round-reduced of the versions distinguishers on CRAFT. We find that the success probability of theory and experiment are close when we fix the data complexity and threshold value. Finally, we compare the three models using the mathematical tool Matlab and conclude that Model 3 has better performance.
With the rapid advancement of physical-layer security technology, the covert and secure communication has become crucial in safeguarding wireless communication systems. In this paper, we propose a joint covert and sec...
详细信息
Photonic crystal fiber (PCF) has shown a promising application in various fields of modern optics due to its excellent transmission characteristics. However, conventional numerical solution methods have limitations su...
详细信息
Formal concept analysis is a key tool in data analysis and knowledge representation and a specific method for granular computing. Object granules constitute the basic granular knowledge in a concept lattice. Three-way...
详细信息
The mixed-integer quadratically constrained quadratic fractional programming(MIQCQFP)problem often appears in various fields such as engineering practice,management science and network ***,most of the solutions to suc...
详细信息
The mixed-integer quadratically constrained quadratic fractional programming(MIQCQFP)problem often appears in various fields such as engineering practice,management science and network ***,most of the solutions to such problems are often designed for their unique *** paper puts forward a new global optimization algorithm for solving the problem *** first convert the MIQCQFP into an equivalent generalized bilinear fractional programming(EIGBFP)problem with integer ***,we linearly underestimate and linearly overestimate the quadratic functions in the numerator and the denominator respectively,and then give a linear fractional relaxation technique for EIGBFP on the basis of non-negative *** that,combining rectangular adjustment-segmentation technique and midpointsampling strategy with the branch-and-bound procedure,an efficient algorithm for solving MIQCQFP globally is ***,a series of test problems are given to illustrate the effectiveness,feasibility and other performance of this algorithm.
Logical reasoning task has attracted great interest since it was proposed. Faced with such a task, current competitive models, even large language models (e.g., ChatGPT and PaLM 2), still perform badly. Previous promi...
详细信息
Video description aims to translate the visual content in a video with appropriate natural language. Most of current works only focus on the description of factual content, paying insufficient attention to the emotion...
详细信息
The paper studies the leader-following consensus of the switched uncertain time-delay MASs under fixed directed communication topology. Through the switching distributed controller and the minimum dwell time, the suff...
详细信息
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a...
详细信息
Link prediction is a crucial issue in opportunistic networks routing research. Static link prediction methods ignore the historical information of network evolution, which affects the prediction accuracy. In this pape...
详细信息
暂无评论