首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信保密与通信安全论文--理论论文

轻量级流密码的设计及选择初始向量统计分析

Acknowledgements第6-7页
List of Publications第7-8页
摘要第8-9页
Abstract第9页
1 Introduction第14-28页
    1.1 Cryptology第14页
    1.2 Stream ciphers第14-15页
    1.3 Feedback shift register第15-16页
    1.4 Four lightweight and famous stream ciphers第16-21页
        1.4.1 A5/1 stream cipher第17-18页
        1.4.2 Trivium stream cipher第18页
        1.4.3 MICKEY 2.0 stream cipher第18-20页
        1.4.4 Grain-v1 stream cipher第20-21页
    1.5 Cryptanalysis of stream ciphers第21-26页
        1.5.1 Time Memory Data Trade-off (TMDTO) attack第21-22页
        1.5.2 Guess and Determine attack第22-23页
        1.5.3 Algebraic attack第23页
        1.5.4 Correlation attack第23-24页
        1.5.5 Cube attack第24-25页
        1.5.6 Related key attack第25-26页
        1.5.7 Linear Approximation attack第26页
    1.6 Thesis outline第26-28页
2 Design ultra-lightweight stream ciphers第28-68页
    2.1 Design principles for Ultra-lightweight Stream cipher that Permanently Uses Key(USPUK)第31-35页
    2.2 Hardware aspect第35-36页
    2.3 Fruit-v2: ultra-lightweight stream cipher第36-47页
        2.3.1 The design criteria of Fruit-v2第38-39页
        2.3.2 The resistance to known attacks of Fruit-v2第39-45页
        2.3.3 Hardware implementation of Fruit-v2第45-47页
    2.4 Fruit-80:a secure ultra-lightweight stream cipher第47-58页
        2.4.1 The design criteria of Fruit-80第48-50页
        2.4.2 The resistance to known attacks of Fruit-80第50-56页
        2.4.3 Hardware Implementation of Fruit-80第56-58页
    2.5 Fruit-128:a secure ultra-lightweight stream cipher第58-66页
        2.5.1 The design criteria of Fruit-128第60-61页
        2.5.2 The resistance to known attacks of Fruit-128第61-64页
        2.5.3 Implementation Results of Fruit128第64-66页
    2.6 Summary第66-68页
3 A new chosen Ⅳ statistical distinguishing framework第68-82页
    3.1 Introduction第68-71页
    3.2 Brief Description of ACORN-v3第71-73页
    3.3 Brief Description of Grain-128a第73-75页
    3.4 Cube testers第75页
    3.5 Goodness-of-fit test第75-76页
    3.6 New Chosen Ⅳ Statistical attack framework第76-78页
    3.7 Chosen Ⅳ Statistical attack on ACORN-v3第78-79页
    3.8 Chosen Ⅳ Statistical attack on Grain-128a第79-80页
    3.9 Summary第80-82页
4 Summary and conclusions第82-86页
    4.1 Summary and conclusions in the design第82-83页
    4.2 Summary and conclusions in the chosen Ⅳ statistical cryptanalysis第83-84页
    4.3 Future research directions in the design第84页
    4.4 Future research directions in the chosen Ⅳ statistical cryptanalysis第84-86页
5 References第86-90页

论文共90页,点击 下载论文
上一篇:氧化锌量子点的制备与应用研究
下一篇:基于信号稀疏特性的语音增强算法研究