动作谜 发表于 2025-3-23 13:44:34

Word Oriented Cascade Jump ,−LFSRconstructions make use of special word oriented .−LFSRs, which can be efficiently implemented on modern CPU and only require few memory. Experimental results show that one type of efficient word oriented cascade jump .−LFSRs can be used as building blocks for software oriented stream cipher.

Tracheotomy 发表于 2025-3-23 15:31:19

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKEed in the above paper; to our best knowledge, this is the first example of length-preserving hybrid encryption; 2) postquantum deterministic encryption (using the IND-CPA variant of code-based McEliece PKE) which enjoys a simplified construction, where the public key is re-used as a hash function.

CORE 发表于 2025-3-23 21:34:31

http://reply.papertrans.cn/16/1597/159620/159620_13.png

amenity 发表于 2025-3-24 01:59:29

On Some Sequences of the Secret Pseudo-random Index , in RC4 Key Schedulingresults on the probability and the number of such sequences. As an application, we explain a new secret key recovery algorithm that can recover a 16 bytes secret key with a success probability of 0.1409. Our strategy has high time complexity at this point and requires further improvement to be feasible in practice.

小画像 发表于 2025-3-24 03:10:35

http://reply.papertrans.cn/16/1597/159620/159620_15.png

cipher 发表于 2025-3-24 07:02:56

Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensionsonditional user anonymity against a semi-honest server. If the pre-computation is allowed, the computation cost of the . protocol is the same as the well-known Diffie-Hellman protocol! In addition, we extend the . protocol in two ways.

多产子 发表于 2025-3-24 13:38:01

http://reply.papertrans.cn/16/1597/159620/159620_17.png

疾驰 发表于 2025-3-24 17:09:29

0302-9743fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.978-3-642-02180-0978-3-642-02181-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

Ambiguous 发表于 2025-3-24 19:09:49

Energy Resources in East African-abelian group of matrices is used. The primary advantadge of this scheme is that no prime numbers are used and the efficiency is guaranteed by the use of a quick exponentiation algorithm for this group of matrices.

irreparable 发表于 2025-3-24 23:52:26

Energy Resources in East Africaonditional user anonymity against a semi-honest server. If the pre-computation is allowed, the computation cost of the . protocol is the same as the well-known Diffie-Hellman protocol! In addition, we extend the . protocol in two ways.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes; 18th International S Maria Bras-Amorós,Tom Høholdt Conference proceedings