版权说明 操作指南
首页 > 成果 > 详情

Parallel Validity Analysis oftheBoomerang Attack Model

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
会议论文
作者:
Li, Pei;Tan, Liliu;Yao, Shixiong;Chen, Jiageng
通讯作者:
Chen, J.
作者机构:
[Tan, Liliu; Li, Pei; Yao, Shixiong; Chen, Jiageng] Cent China Normal Univ, Wuhan 430079, Hubei, Peoples R China.
通讯机构:
[Chen, J.] C
Central China Normal University, Hubei, China
语种:
英文
关键词:
Boomerang attack;Differential cryptanalysis;GPU;KATAN32;OpenCL
期刊:
Communications in Computer and Information Science
ISSN:
1865-0929
年:
2022
卷:
1641
页码:
68-86
会议名称:
3rd International Conference on Emerging Information Security and Applications (EISA)
会议论文集名称:
Communications in Computer and Information Science
会议时间:
OCT 29-30, 2022
会议地点:
Wuhan, PEOPLES R CHINA
会议主办单位:
[Li, Pei;Tan, Liliu;Yao, Shixiong;Chen, Jiageng] Cent China Normal Univ, Wuhan 430079, Hubei, Peoples R China.
主编:
Chen, J He, D Lu, R
出版地:
GEWERBESTRASSE 11, CHAM, CH-6330, SWITZERLAND
出版者:
SPRINGER INTERNATIONAL PUBLISHING AG
ISBN:
978-3-031-23097-4; 978-3-031-23098-1
机构署名:
本校为第一机构
摘要:
The boomerang attack is an extension of the differential attack that make it possible to theoretically construct a long quartet structured distinguisher with high probability from two unrelated short differential characteristics. This paper gives a quantitative analysis on the precision and effectiveness of theoretical probabilistic model of the boomerang attack and its extension (rectangle attack) by applying these two attack method on a lightweight block cipher KATAN32. The experimental result shows that the deviation between the theoretical ...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com