躲债 发表于 2025-3-25 03:52:27

Dietmar Schomburg,Ida Schomburg first impossible differential, differential and linear cryptanalyses of MIBS. Their best attack was a linear attack on the 18-round MIBS-80. In this paper, we significantly improve their attack by discovering more approximations and mounting Hermelin et al.’s multidimensional linear cryptanalysis.

compose 发表于 2025-3-25 07:44:33

https://doi.org/10.1007/978-3-540-85705-1e shown that the construction is not SPRP secure if the mixing layer of EME is replaced by any linear mixing over a binary field. In this paper, we complete their observation by showing SPRP-insecurity even if we have linear mixing over any non-binary prime field. We have some positive result that P

G-spot 发表于 2025-3-25 12:22:33

https://doi.org/10.1007/978-3-540-85705-1 exponentiation inversion (EI) problem. According to the results, FAPI problem is solved if EI problem of exponent (.. − 1)/Φ.(.) is solved, where ., ., and . are the characteristic, embedding degree, and order of pairing group, respectively. Φ.(.) is the cyclotomic polynomial of order .. This paper

Oafishness 发表于 2025-3-25 18:23:29

http://reply.papertrans.cn/15/1485/148449/148449_24.png

Angioplasty 发表于 2025-3-25 20:20:14

http://reply.papertrans.cn/15/1485/148449/148449_25.png

Inflamed 发表于 2025-3-26 02:04:35

0302-9743of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.978-3-319-09842-5978-3-319-09843-2Series ISSN 0302-9743 Series E-ISSN 1611-3349

Duodenitis 发表于 2025-3-26 06:34:31

http://reply.papertrans.cn/15/1485/148449/148449_27.png

SLING 发表于 2025-3-26 12:25:13

Dietmar Schomburg,Ida Schomburg,Antje Chang. Let . and . be the size of secret and successful cheating probability of cheaters, respectively. Then the sizes of share . of two proposed schemes respectively satisfy . and . which are only 2 and 3 bits longer than the existing lower bound.

乳汁 发表于 2025-3-26 14:17:23

http://reply.papertrans.cn/15/1485/148449/148449_29.png

狂怒 发表于 2025-3-26 18:07:35

Dietmar Schomburg,Ida SchomburgWe also use Nguyen et al.’s technique to have less time complexity. We attack on 19 rounds of MIBS-80 with a time complexity of 2. 19-round MIBS-80 encryptions by using 2. plaintext-ciphertext pairs. To the best of our knowledge, the result proposed in this paper is the best cryptanalytic result for MIBS, so far.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Advances in Information and Computer Security; 9th International Wo Maki Yoshida,Koichi Mouri Conference proceedings 2014 Springer Internat