ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

来源 :电子科学学刊:英文版 | 被引量 : 0次 | 上传用户:yangke0248
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new ac
其他文献
In this paper, a Modified Complex Lapped Transform domain Motion Estimation (MCLT-ME) method to estimate the motion of video sequence is proposed. The proposed
Shared Memory (SM) switches are widely used for its high throughput, low delay and efficient use of memory. This paper compares the performance of two prominent
Synthetic Aperture Radar (SAR) imaging of ocean surface features is studied. The simulation of the turbulent and vortical features generated by a moving ship an
The proposed scheme is based on Discrete Fourier Transform (DFT) domain processing. The key technology of this scheme is jamming parameters' accurate estima
Two types of new subliminal channels are constructed respectively based on provable secure public key cryptosystems and identity recognition in some network app
Targeting at the high expense and inflexibility to realize VMEbus bridge controller by professional Integrated Circuit (IC), this paper presents a scheme of ado
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to