Introduction New distinguisher for SIMD Security proof with distinguishers Analysis of differential paths
41 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Introduction New distinguisher for SIMD Security proof with distinguishers Analysis of differential paths

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
41 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Introduction New distinguisher for SIMD Security proof with distinguishers Analysis of differential paths Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent École Normale Supérieure Paris, France SAC 2010 – University of Waterloo G. Leurent (ENS) Security Analysis of SIMD SAC 2010 1 / 29

  • no structural

  • message expansion

  • simd sac

  • davies-meyer compression

  • nist sha

  • valid submissions

  • ecole normale


Sujets

Informations

Publié par
Nombre de lectures 10
Langue English

Extrait

IntroductionNewidtsniugsiehfrroMDSIcuSetyriooprtiwfsidhgnithsiunalyersAfdifsisotnaiefershpltaE(tnerueL.GlynayAiturec)SNS92/1
École Normale Supérieure Paris, France
Charles Bouillaguet, Pierre-Alain Fouque,Gaëtan Leurent
Security Analysis ofSIMD
SAC 2010 – University of Waterloo
sosiIMfSACDS1020
alAntyriSIofisys102CASDM
IA public function with no structural properties. ICryptographic strength without keys!
Hash functions
92/20G.ne(teLrueSucNE)S
0x1d66ca77ab361c6f
IF:{0,1}→ {0,1}n
F
nIrtdocuitnoSDMISrofpytirucetiiswdNeershuingsrnAsiehsifolasywithroofingudistslaithtapffidnere
SDMISrofrehsiugnthwiofroypiturecnIrtistiNewdtionoducslaithtapsiehsrnAidtsniugdifferenalysisofNE)SeSucirytnAlaG.Leurent(
F
0x1d66ca77ab361c6f
IF:{0,1}→ {0,1}n
Hash functions
IApublicfunction withno structural properties. ICryptographic strength without keys!
9/202102CASDMISfosisy
spathtialerensherforSistinguitipyorfoMISDceruguinheisthwistdifosiffidnAsrsyla
ISimilar to the AES competition IOrganized by NIST
I14 in the second round (July 2009) I5 finalists in September 2010? IWinner in 2012?
ISubmission dead-line was October 2008: 64 candidiates I51 valid submissions
The SHA-3 competition
29tnerSNE(GueL.CA0201/3osSfMISDyAnalysi)SecurittionNewdIntroduc
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents