Invigorate 发表于 2025-3-30 10:32:32

Yuri Avramenko,Andrzej Kraslawskihave proved that such generators are pseudorandom only if the pseudorandom function is used internally at least five times. The proof is given using two different approaches: deterministic and probabilistic. Some cryptographic implications are also discussed.

打算 发表于 2025-3-30 15:03:08

Pre-Detailed Design: Process Model Selection with the jump complexity, establish formulas for the expected value and the variance of the jump complexity, and prove probabilistic theorems on the jump complexity profile of random sequences. We also extend earlier work on frequency distributions in the linear complexity profile to joint frequency distributions.

circuit 发表于 2025-3-30 18:24:22

http://reply.papertrans.cn/15/1477/147622/147622_53.png

Temporal-Lobe 发表于 2025-3-30 22:29:47

http://reply.papertrans.cn/15/1477/147622/147622_54.png

DENT 发表于 2025-3-31 02:16:37

Shuchen Huang,Junjian Qi,Kai Sun key-updating schemes, i.e., one is sequential type and the other is parallel type, and show that both schemes are equivalent to each other in a polynomial time sense, i.e., there exists a deterministic polynomial time algorithm that transforms the sequential key-updating scheme to the parallel one,

voluble 发表于 2025-3-31 05:25:27

http://reply.papertrans.cn/15/1477/147622/147622_56.png

闲聊 发表于 2025-3-31 12:40:29

Bis zum letzten Tag: Beispiele,ity based on the difficulty of computing discrete logarithms. The modification that we present here will remain secure if either of two computational problems is infeasible, namely factoring a large integer and computing a discrete logarithm. For this enhanced security we require somewhat more commu

dendrites 发表于 2025-3-31 14:50:50

http://reply.papertrans.cn/15/1477/147622/147622_58.png

GRIPE 发表于 2025-3-31 18:40:47

http://reply.papertrans.cn/15/1477/147622/147622_59.png

远地点 发表于 2025-3-31 22:20:26

Case-Based Reasoning Environment — Cabareen arithmetic in the multiplicative group .* of a finite field . (or any finite Abelian group .), it uses a finite subset of an infinite Abelian group which itself is not a subgroup, namely the set of reduced principal ideals in a real quadratic field. As the authors presented the scheme and its secur
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Advances in Cryptology – EUROCRYPT ‘90; Workshop on the Theo Ivan Bjerre Damgård Conference proceedings 1991 Springer-Verlag Berlin Heidelb