Ptosis 发表于 2025-3-23 12:42:11

http://reply.papertrans.cn/16/1598/159728/159728_11.png

FLOAT 发表于 2025-3-23 16:37:45

http://reply.papertrans.cn/16/1598/159728/159728_12.png

Cholesterol 发表于 2025-3-23 21:08:15

Sakura: A Flexible Coding for Tree Hashingthe message blocks and chaining values into inputs to the underlying function for any topology, including sequential hashing. The main benefit is to avoid input clashes between different tree growing strategies, even before the hashing modes are defined, and to make the SHA-3 standard tree-hashing r

辩论的终结 发表于 2025-3-24 01:57:22

Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functionsions; it only covers single-stage security notions. They defined reset indifferentiability, and proved the reset indifferentiability theorem, which covers all security notions; if a hash function is reset indifferentiable from a random oracle denoted by RO, for any security, any cryptosystem is at l

女上瘾 发表于 2025-3-24 03:06:06

Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applicationstputs. When the cost of computing . and . are different, the problem is called unbalanced MitM attack. It is known that, for the balanced case, the MitM attack can be performed only with a negligible memory size without significantly increasing the computational cost by using the Floyd’s cycle-findi

不真 发表于 2025-3-24 08:12:47

http://reply.papertrans.cn/16/1598/159728/159728_16.png

scoliosis 发表于 2025-3-24 12:54:44

http://reply.papertrans.cn/16/1598/159728/159728_17.png

monopoly 发表于 2025-3-24 17:46:31

Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorroipher against various attacks and concluded the cipher has a large security margin. Recently, Guo et. al have given a key recovery attack on full-round Zorro by using the internal differential characteristics. However, the attack only works for 2. out of 2. keys. In this paper, the secret key se

Gossamer 发表于 2025-3-24 22:31:31

http://reply.papertrans.cn/16/1598/159728/159728_19.png

Myocarditis 发表于 2025-3-24 23:39:02

http://reply.papertrans.cn/16/1598/159728/159728_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Applied Cryptography and Network Security; 12th International C Ioana Boureanu,Philippe Owesarski,Serge Vaudenay Conference proceedings 201