相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Wuhan University Journal of Natural Sciences》《Chinese Journal of Electronics》更多>>
supported by the National Natural Science Foundation of China(No.61572294,No.61502218,No.61173139);the Outstanding Young Scientists Foundation Grant of Shandong Province(No.BS2014DX016);the Natural Science Foundation of Shandong Province(No.ZR2013FQ021)
Cut-and-choose paradigm makes Yao's protocol for two-party computation secure in malicious model with an error probability.In CRYPTO 2013,based on multi-phase cut-and-choose,Lindell reduced this probability to the opt...
supported by the National Natural Science Foundation of China (No.61272434, No.61672330, No.61602287);the Natural Science Foundation of Shandong Province (No.ZR2013FQ021)
We present two fault injection attacks against the IC-Printing block cipher(PRINTcipher). The basic idea of our attack is to notice the property that by using some couples of input difference and output difference, th...
Supported by the National Natural Science Foundation of China(61272434);the Natural Science Foundation of Shandong Province(ZR 2012FM004,ZR2013FQ021);the Foundation of Science and Technology on Information Assume Laboratory(KJ-13-004)
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This ...
supported by the the National Science Foundation of China(61272434);the Natural Science Foundation of Shandong Province(ZR2012FM004,ZR2013FQ021);the Project of Senior Visiting Scholar of Shandong Province and Foundation of Science and Technology on Information Assume Laboratory(KJ-13-004)
In this paper, we present a new lightweight block cipher named eight-sided fortress(ESF), which is suitable for resource-constrained environments such as sensor networks and low-cost radio rrequency identification(...