Konferans bildirisi Açık Erişim
Tezcan, Cihangir; Okan, Galip Oral; Senol, Asuman; Dogan, Erol; Yucebas, Furkan; Baykal, Nazife
{ "conceptrecid": "49634", "created": "2021-03-15T22:32:14.122210+00:00", "doi": "10.1007/978-3-319-55714-4_2", "files": [ { "bucket": "ce87d9bc-55db-401f-ac93-988eb7a796ee", "checksum": "md5:f673105119376cd505b78bf37d216336", "key": "bib-7fa2eed2-1456-4a13-b9c9-48672a924807.txt", "links": { "self": "https://aperta.ulakbim.gov.tr/api/files/ce87d9bc-55db-401f-ac93-988eb7a796ee/bib-7fa2eed2-1456-4a13-b9c9-48672a924807.txt" }, "size": 217, "type": "txt" } ], "id": 49635, "links": { "badge": "https://aperta.ulakbim.gov.tr/badge/doi/10.1007/978-3-319-55714-4_2.svg", "bucket": "https://aperta.ulakbim.gov.tr/api/files/ce87d9bc-55db-401f-ac93-988eb7a796ee", "doi": "https://doi.org/10.1007/978-3-319-55714-4_2", "html": "https://aperta.ulakbim.gov.tr/record/49635", "latest": "https://aperta.ulakbim.gov.tr/api/records/49635", "latest_html": "https://aperta.ulakbim.gov.tr/record/49635" }, "metadata": { "access_right": "open", "access_right_category": "success", "communities": [ { "id": "tubitak-destekli-proje-yayinlari" } ], "creators": [ { "name": "Tezcan, Cihangir" }, { "affiliation": "Middle East Tech Univ, CYDES Lab, Dept Cyber Secur, Informat Inst, Ankara, Turkey", "name": "Okan, Galip Oral" }, { "affiliation": "Middle East Tech Univ, CYDES Lab, Dept Cyber Secur, Informat Inst, Ankara, Turkey", "name": "Senol, Asuman" }, { "affiliation": "Middle East Tech Univ, CYDES Lab, Dept Cyber Secur, Informat Inst, Ankara, Turkey", "name": "Dogan, Erol" }, { "affiliation": "Middle East Tech Univ, CYDES Lab, Dept Cyber Secur, Informat Inst, Ankara, Turkey", "name": "Yucebas, Furkan" }, { "affiliation": "Middle East Tech Univ, CYDES Lab, Dept Cyber Secur, Informat Inst, Ankara, Turkey", "name": "Baykal, Nazife" } ], "description": "Differential distribution and linear approximation tables are the main security criteria for S-box designers. However, there are other S-box properties that, if overlooked by cryptanalysts, can result in erroneous results in theoretical attacks. In this paper we focus on two such properties, namely undisturbed bits and differential factors. We go on to identify several inconsistencies in published attacks against the lightweight block ciphers PRESENT, PRIDE, and RECTANGLE and present our corrections.", "doi": "10.1007/978-3-319-55714-4_2", "has_grant": false, "license": { "id": "cc-by" }, "meeting": { "title": "LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY" }, "publication_date": "2017-01-01", "relations": { "version": [ { "count": 1, "index": 0, "is_last": true, "last_child": { "pid_type": "recid", "pid_value": "49635" }, "parent": { "pid_type": "recid", "pid_value": "49634" } } ] }, "resource_type": { "subtype": "conferencepaper", "title": "Konferans bildirisi", "type": "publication" }, "title": "Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE, and RECTANGLE Revisited" }, "owners": [ 1 ], "revision": 1, "stats": { "downloads": 7.0, "unique_downloads": 7.0, "unique_views": 20.0, "version_downloads": 7.0, "version_unique_downloads": 7.0, "version_unique_views": 20.0, "version_views": 20.0, "version_volume": 1519.0, "views": 20.0, "volume": 1519.0 }, "updated": "2021-03-15T22:32:14.166720+00:00" }
Görüntülenme | 20 |
İndirme | 7 |
Veri hacmi | 1.5 kB |
Tekil görüntülenme | 20 |
Tekil indirme | 7 |