Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Yuki Funabiki"'
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :213-225
At the FSE conference of ToSC 2018, Kranz et al. presented their results on shortest linear programs for the linear layers of several well known block ciphers in literature. Shortest linear programs are essentially the minimum number of 2-input xor g
Autor:
Sumio Morioka, Hiroyasu Kubo, Kazuhiko Minematsu, Andrey Bogdanov, Yuki Funabiki, Maki Shigeri, Kosei Sakamoto, Takanori Isobe, Nao Shibata
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1629-1639
Tweakable block cipher (TBC) is an extension of conventional block cipher. We study how to build a TBC based on generalized Feistel structure (GFS), a classical block cipher construction. While known dedicated TBC proposals are based on substitution-
Publikováno v:
2021 IEEE International Workshop on Information Forensics and Security (WIFS).
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1259-1271
Autor:
Hiroyasu Kubo, Nao Shibata, Kosei Sakamoto, Takanori Isobe, Kazuhiko Minematsu, Yuki Funabiki, Maki Shigeri
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :212-214
Autor:
Sumio Morioka, Maki Shigeri, Nao Shibata, Takanori Isobe, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Kazuhiko Minematsu, Kosei Sakamoto
Publikováno v:
Advances in Information and Computer Security ISBN: 9783030268336
IWSEC
IWSEC
Tweakable block cipher (TBC) is an extension of conventional block cipher. We study how to build a TBC based on generalized Feistel structure (GFS), a classical block cipher construction. While known dedicated TBC proposals are based on substitution-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::75343057ff85d19391e850132f06ccb0
https://doi.org/10.1007/978-3-030-26834-3_8
https://doi.org/10.1007/978-3-030-26834-3_8
Publikováno v:
Cryptology and Network Security ISBN: 9783030004330
CANS
CANS
SNOW 2.0 is a software-oriented stream cipher and internationally standardized by ISO/IEC 18033-4. In this paper, we present three attacks on SNOW 2.0 by MILP-aided automatic search algorithms. First, we present an efficient algorithm to find linear
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7d830ee852f59b3de38b381a7704e38f
https://doi.org/10.1007/978-3-030-00434-7_20
https://doi.org/10.1007/978-3-030-00434-7_20
Publikováno v:
Information Security and Privacy ISBN: 9783319600543
ACISP (1)
ACISP (1)
HIGHT is a lightweight block cipher with 64-bit block length and 128-bit security, and it is based on the ARX-based generalized Feistel network. HIGHT became a standard encryption algorithm in South Korea and also is internationally standardized by I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8a43ac450a66b1982b2f6bdc0d6c001b
https://doi.org/10.1007/978-3-319-60055-0_19
https://doi.org/10.1007/978-3-319-60055-0_19
Publikováno v:
Advances in Information and Computer Security ISBN: 9783030268336
IWSEC
IWSEC
At the FSE conference of ToSC 2018, Kranz et al. presented their results on shortest linear programs for the linear layers of several well known block ciphers in literature. Shortest linear programs are essentially the minimum number of 2-input xor g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::47f264eb06093778d70efa469797353a
https://infoscience.epfl.ch/record/270817
https://infoscience.epfl.ch/record/270817