Security Analysis of HyRal

نویسندگان

  • Heung Youl YOUM
  • Jung Hwan Song
  • Sun Young Lee
چکیده

It is further believed that any practical attacks against HyRal are not possible with respect to the state-of-the-art. That is, we conclude that HyRal might be resistant to some well-known analysis such as differential attack, higher order differential attack, linear attack(including Truncated Linear Attack), interpolation attacks, algebraic attack (including XL attack and XSL attack), related key attack, and the existence of weak keys and semi-weak keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

The Role of Social Factors in the Explanation of Vandalism among High School Students in Andimeshk Focusing on the Social Security

This paper tries to study the role of social  factors in the explanation of vandalism among high school students in Andimeshk. Focusing on the social security. Through survey study more than 300 ones were selected by Cochoran Formula. After gathering he data through questionnaire, they were analyzed by Pearson Coefficient Correlation, Variance Analysis test, Multi-variable regression and path a...

متن کامل

The Role of Security in Social Deviations

The aim of this study is to investigate the role of security in social deviations among women of Babol city. Descriptive survey research method was used and the unit of analysis is 15-29 year old women that 284 women are selected on the basis of Cochran formula and using multi-stage random cluster sampling. The results show that there is a weak significant relationship between the independent v...

متن کامل

Measuring gas demand security using Principal Component Analysis (PCA): A case study

Safeguarding the energy security is an important energy policy goal of every country. Assuring sufficient and reliable resources of energy at affordable prices is the main objective of energy security. Due to such reasons as special geopolitical position, terrorist attacks and other unrest in the Middle East, securing Iran’s energy demand and increasing her natural gas exports have turned into ...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011