搜索结果: 1-7 共查到“AES-192”相关记录7条 . 查询时间(0.093 秒)
Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys
Advanced Encryption Standard AES AES-192
2019/4/3
Concerning the side-channel attacks on Advanced Encryp- tion Standard, it seems that majority of studies focus on the lowest size: AES-128. Even when adaptable to higher sizes (AES-192 and AES-256), l...
This paper studies key-recovery attacks on AES-192 and PRINCE under single-key model by methodology of meet-in-the-middle attack. A new technique named key-dependent sieve is proposed to further reduc...
改进的7轮AES-192和8轮AES-256的中间相遇攻击
AES 中间相遇攻击 时间复杂 密码算法
2012/4/17
利用AES密码算法轮变换的特点,构造了一个5轮中间相遇攻击区分器的新变体。基于该区分器变体,使用时空折中方法,针对7轮AES-192和8轮AES-256分别给出了新的攻击方法。研究结果表明,与FSE2008提出的针对AES的中间相遇攻击结果比较,新分析所需的时间复杂度和存储复杂度降低。
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
DFA fault injection AES-192 AES-256 adaptation extension reproduction
2010/7/14
Since its announcement, AES has been subject to different DFA attacks. Most of these attacks target the AES with 128-bit key. However, the two other variants are nowadays deployed in various applicati...
改进的7轮AES-192的碰撞攻击
AES 碰撞攻击 区分器
2009/11/19
对7轮AES-192的碰撞攻击进行了改进.改进的碰撞攻击是基于Gilbert和Minier的攻击过程并且利用了一些AES-192的密钥特性.改进的攻击可以使用2123字节的存储通过大约2120次加密运算来恢复主密钥,此过程比Gilbert和Minier的攻击过程提高了224倍而只需增加28倍的存储量.如果保持存储量不变,改进的攻击过程需要大约2127次加密运算.
Related-key Cryptanalysis of the Full AES-192 and AES-256
Related-key Cryptanalysis Full AES-192 AES-256
2009/7/14
In this paper we present two related-key attacks on the full
AES. For AES-256 we show the first key recovery attack that works
for all the keys and has complexity 2119, while the recent attack by
B...