نتایج جستجو برای: box key

تعداد نتایج: 632676  

2014
Alex Biryukov Charles Bouillaguet Dmitry Khovratovich

In this paper we pick up an old challenge to design public key or white-box constructions from symmetric cipher components. We design several encryption schemes based on the ASASA structure ranging from fast and generic symmetric ciphers to compact public key and white-box constructions based on generic affine transformations combined with specially designed low degree non-linear layers. While ...

Journal: :journal of agricultural science and technology 2014
r. sarvestani s. a. peyghambary a. abbasi

artemisia annua is still the only commercial source of artemisinin. to date, a number of biochemical and molecular studies about artemisinin’s biosynthetic pathway have been carried out. in metabolic engineering approach, isolation and characterization of promoters leads to an understanding of which cis-acting elements are responsible for the regulation of gene expression. dbr2 is a key enzyme ...

2013
Meltem Sönmez Turan

Lightweight cryptography aims to provide sufficient security with low area/power/energy requirements for constrained devices. In this paper, we focus on the lightweight encryption algorithm specified and approved in NRS 009-6-7:2002 by Electricity Suppliers Liaison Committee to be used with tokens in prepayment electricity dispensing systems in South Africa. The algorithm is a 16-round SP netwo...

2010
Pouyan Sepehrdad Serge Vaudenay Martin Vuagnoux

In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known KSA weaknesses to provide practical key recovery attacks. Henceforth, we apply a similar technique on RC4 a...

2005
Adam L. Young Moti Yung

In this paper we present an RSA backdoor that, for example, can be used for a hardware-based RSA key recovery system. The system is robust in the sense that a successful reverse-engineer is not able to obtain previous nor future RSA private keys that have been/will be generated within the key generation device. The construction employs the notion of two elliptic curves in which one is the “twis...

Journal: :JDCTA 2008
Yoon-Su Jeong Yong-Tae Kim Gil-Cheol Park Sang Ho Lee

In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distribution scheme, recently being researched for advances of security in WSNs, distributes keys with probability with the use of qcomposite random key pre-distribution method, but there is a high probability that there is no ke...

2000
Niels Ferguson John Kelsey Bruce Schneier Doug Whiting

The Twofish AES submission document contains a partial chosen-key and a related-key attack against ten rounds of Twofish without whitening, using 256-bit keys. This attack does not work; it makes use of a postulated class of weak key pairs which has the S-box keys and eight successive round keys equal, but no such pairs exist. In this report we analyze the occurrence of this kind of weak key pa...

2011
Alex Biryukov Ivica Nikolic

We present the first automatic search algorithms for the best related-key differential characteristics in DES-like ciphers. We show that instead of brute-forcing the space of all possible differences in the master key and the plaintext, it is computationally more efficient to try only a reduced set of input-output differences of three consecutive S-box layers. Based on this observation, we prop...

2005
Joël Alwen Giuseppe Persiano Ivan Visconti

In this paper, we continue the study the round complexity of black-box zero knowledge in the bare public-key (BPK, for short) model previously started by Micali and Reyzin in [11]. Specifically we show the impossibility of 3-round concurrent (and thus resettable) black-box zeroknowledge argument systems with sequential soundness for non-trivial languages. In light of the previous state-of-the-a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید