Flustered 发表于 2025-3-23 09:58:49

http://reply.papertrans.cn/15/1476/147512/147512_11.png

分发 发表于 2025-3-23 17:04:27

http://reply.papertrans.cn/15/1476/147512/147512_12.png

dearth 发表于 2025-3-23 19:28:35

http://reply.papertrans.cn/15/1476/147512/147512_13.png

Allodynia 发表于 2025-3-23 22:19:57

http://reply.papertrans.cn/15/1476/147512/147512_14.png

序曲 发表于 2025-3-24 02:32:26

http://reply.papertrans.cn/15/1476/147512/147512_15.png

使高兴 发表于 2025-3-24 09:36:17

Kannan Balasubramanian,Marko Burghard.. The Meet-in-the-Middle (MitM) is a general paradigm to build preimage and collision attacks on hash functions, which has been automated in several papers. However, those automatic tools mostly focus on the hash function with Substitution-Permutation network (SPN) as building blocks, and only one

施加 发表于 2025-3-24 13:24:08

http://reply.papertrans.cn/15/1476/147512/147512_17.png

Constrain 发表于 2025-3-24 15:00:27

http://reply.papertrans.cn/15/1476/147512/147512_18.png

arthroplasty 发表于 2025-3-24 21:52:02

http://reply.papertrans.cn/15/1476/147512/147512_19.png

Aviary 发表于 2025-3-25 02:29:04

0302-9743 es; security proofs andsecurity models; .Part VII: post-quantum cryptography; .Part VIII: quantum cryptography; key exchange; symmetric-key design..978-981-99-8726-9978-981-99-8727-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Cryptology – ASIACRYPT 2023; 29th International C Jian Guo,Ron Steinfeld Conference proceedings 2023 International Association