Integrate 发表于 2025-3-30 08:18:02

http://reply.papertrans.cn/15/1477/147614/147614_51.png

BRAND 发表于 2025-3-30 16:17:56

Cryptanalysis of the CFB mode of the DES with a reduced number of rounds978-1-137-02953-9

Palpitation 发表于 2025-3-30 16:47:58

https://doi.org/10.1007/978-2-8178-0379-1bits, and a linear attack with 2. known plaintexts can find 7 key bits. This suggests that it is not safe to reduce the number of rounds in order to improve the performance. Moreover, it is shown that the final permutation has some cryptographic significance in the CFB mode.

辩论 发表于 2025-3-30 22:48:25

http://reply.papertrans.cn/15/1477/147614/147614_54.png

冲突 发表于 2025-3-31 01:37:03

Carotisstenosen und -verschlüsseunt of information that participants must hold in order to ensure that up to . participants (0 ≤ . ≤ . − . + . − 1) cannot obtain any information about a secret with which they are not associated. We also discuss examples of systems that satisfy this bound.

vertebrate 发表于 2025-3-31 07:11:25

0302-9743 diary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoya

积极词汇 发表于 2025-3-31 09:14:36

https://doi.org/10.1007/978-3-642-90652-7s of birational permutations ƒ over k-tuples of numbers, in which both ƒ and ƒ. are low degree rational functions. In this paper we develop two new families of birational permutations, and discuss their cryptographic applications.

驳船 发表于 2025-3-31 13:50:20

Carotisstenosen und -verschlüsses the same broadcast message. In this paper we establish a formal setting to study such secret sharing schemes. The security of the schemes presented is unconditional, since they are not based on any computational assumption. We give bounds on the size of the shares held by participants and on the site of the broadcast message in such schemes.

ERUPT 发表于 2025-3-31 19:52:16

Clinical Examination of Wrist Ligamentsr ever factored by a general purpose factoring algorithm. We also present some conservative extrapolations to estimate the difficulty of factoring even larger numbers, using either the quadratic sieve method or the number field sieve, and discuss the issue of the crossover point between these two methods.

ANT 发表于 2025-4-1 01:45:18

https://doi.org/10.1007/978-2-8178-0379-1 For each of these algorithms their application in the modular exponentiation operation is considered. Modular exponentiation constitutes the basis of many well known and widely used public key cryptosystems. A fast and portable modular exponentiation will considerably enhance the speed and applicability of these systems.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Advances in Cryptology — CRYPTO ’93; 13th Annual Internat Douglas R. Stinson Conference proceedings 1994 Springer-Verlag Berlin Heidelberg