躲债 发表于 2025-3-25 03:52:27
Dietmar Schomburg,Ida Schomburg first impossible differential, differential and linear cryptanalyses of MIBS. Their best attack was a linear attack on the 18-round MIBS-80. In this paper, we significantly improve their attack by discovering more approximations and mounting Hermelin et al.’s multidimensional linear cryptanalysis.compose 发表于 2025-3-25 07:44:33
https://doi.org/10.1007/978-3-540-85705-1e shown that the construction is not SPRP secure if the mixing layer of EME is replaced by any linear mixing over a binary field. In this paper, we complete their observation by showing SPRP-insecurity even if we have linear mixing over any non-binary prime field. We have some positive result that PG-spot 发表于 2025-3-25 12:22:33
https://doi.org/10.1007/978-3-540-85705-1 exponentiation inversion (EI) problem. According to the results, FAPI problem is solved if EI problem of exponent (.. − 1)/Φ.(.) is solved, where ., ., and . are the characteristic, embedding degree, and order of pairing group, respectively. Φ.(.) is the cyclotomic polynomial of order .. This paperOafishness 发表于 2025-3-25 18:23:29
http://reply.papertrans.cn/15/1485/148449/148449_24.pngAngioplasty 发表于 2025-3-25 20:20:14
http://reply.papertrans.cn/15/1485/148449/148449_25.pngInflamed 发表于 2025-3-26 02:04:35
0302-9743of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.978-3-319-09842-5978-3-319-09843-2Series ISSN 0302-9743 Series E-ISSN 1611-3349Duodenitis 发表于 2025-3-26 06:34:31
http://reply.papertrans.cn/15/1485/148449/148449_27.pngSLING 发表于 2025-3-26 12:25:13
Dietmar Schomburg,Ida Schomburg,Antje Chang. Let . and . be the size of secret and successful cheating probability of cheaters, respectively. Then the sizes of share . of two proposed schemes respectively satisfy . and . which are only 2 and 3 bits longer than the existing lower bound.乳汁 发表于 2025-3-26 14:17:23
http://reply.papertrans.cn/15/1485/148449/148449_29.png狂怒 发表于 2025-3-26 18:07:35
Dietmar Schomburg,Ida SchomburgWe also use Nguyen et al.’s technique to have less time complexity. We attack on 19 rounds of MIBS-80 with a time complexity of 2. 19-round MIBS-80 encryptions by using 2. plaintext-ciphertext pairs. To the best of our knowledge, the result proposed in this paper is the best cryptanalytic result for MIBS, so far.