检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Wei LI Linfeng LIAO Dawu GU Shan CAO Yixin WU Jiayao LI Zhihong ZHOU Zheng GUO Ya LIU Zhiqiang LIU
机构地区:[1]School of Computer Science and Technology,Donghua University,Shanghai 201620,China [2]Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240,China [3]Shanghai Key Laboratory of Scalable Computing and Systems,Shanghai 200240,China [4]Shanghai Key Laboratory of Integrate Administration Technologies for Information Security,Shanghai 200240,China [5]School of Microelectronics,Shanghai Jiao Tong University,Shanghai 200240,China [6]Department of Computer Science and Engineering,University of Shanghai for Science and Technology,Shanghai 200093,China
出 处:《Science China(Information Sciences)》2020年第3期249-251,共3页中国科学(信息科学)(英文版)
基 金:supported by National Natural Science Foundation of China (Grant Nos. 61772129, 61472250, 61672347, 61402288, 61402286, 61572192);Shanghai Natural Science Foundation (Grant Nos. 15ZR1400300, 16ZR1401100);Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (Grant No. AGK201703);Opening Project of Shanghai Key Laboratory of Scalable Computing and Systems;National Cryptography Development Fund (Grant No. MMJJ20180101);Fundamental Research Funds for the Central Universities;Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-17-008)
摘 要:Dear editor,The Midori lightweight cipher can be applied in the RFID tags and other low-resource devices to protect information on the Internet.This cipher was proposed by Banik et al.and presented at the ASIACRYPT conference[1].It has a Substitution Permutation Network structure with a 128-bit keysize,and two block-size variants,64 bits and 128 bits.The optimization of its design and implementation mainly consist of replacing an 8-bit S-box with two 4-bit S-boxes.In 2013,Fuhr et al.[2]proposed the ciphertext-only fault analysis(CFA)on AES.Then in 2016,Dobraunig et al.[3]validated the aforementioned CFA using a physical experiment and broke a series of nonce-based authenticated encryption schemes on AES.
分 类 号:TN918.1[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.22.41.47