A-7-1 Related-Key Cube Attack on KATAN48
スポンサーリンク
概要
- 論文の詳細を見る
- 社団法人電子情報通信学会の論文
- 2011-08-30
著者
-
Hirose Shoichi
Graduate School of Engineering, The University of Fukui
-
Hirose Shoichi
Graduate School Of Engineering The Univ. Of Fukui
-
Kuwakado Hidenori
Graduate School Of Engineering Kobe University
-
Hirose Shoichi
Graduate School Of Engineering The University Of Fukui
関連論文
- Differentiability of four prefix-free PGV hash functions
- Sequential Bitwise Sanitizable Signature Schemes
- Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability(Symmetric Key Cryptography)(Cryptography and Information Security)
- A note on practical key derivation functions (情報処理)
- A Note on the Strength of Weak Collision Resistance(Discrete Mathematics and Its Applications)
- An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt (Information Security)
- An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt
- A note on practical key derivation functions (情報セキュリティ)
- Cancellation Moderating Factor Control for DS-CDMA Non-linear Interference Canceller with Antenna Diversity Reception(Wireless Communication Technology, Multi-dimensional Mobile Information Networks)
- Multistage Interference Canceller Combined with Adaptive Array Antenna for DS-CDMA System(Special Section on Multi-dimensional Mobile Information Networks)
- A Chosen-IV Key Recovery Attack on Py and Pypy
- Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
- Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
- A-6-8 Improved Bitslice Network for Computing the TIB3 S-Box
- Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
- S-Box Bitslice Networks as Network Computing
- Compression Functions Suitable for the Multi-Property-Preserving Transform
- Sequential Bitwise Sanitizable Signature Schemes
- Generalized Classes of Weak Keys on RC4 Using Predictive State
- A-7-1 Related-Key Cube Attack on KATAN48
- A Note on Practical Key Derivation Functions
- An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW
- Collision Resistance of Hash Functions in a Weak Ideal Cipher Model
- An AES Based 256-bit Hash Function for Lightweight Applications : Lesamnta-LW
- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
- Secure Regenerating Codes Based on Rashmi-Shah-Kumar MBR Codes
- Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension
- Multilane Hashing Mode Suitable for Parallel Processing
- Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension (ライフインテリジェンスとオフィス情報システム)