取消 发表于 2025-3-23 09:58:51

http://reply.papertrans.cn/17/1673/167235/167235_11.png

Ferritin 发表于 2025-3-23 17:26:26

Tight Characterizations for Preprocessing Against Cryptographic Saltingin both theory and practice: an efficient online attacker can take advantage of advice prepared by a time-consuming preprocessing stage..Salting is a heuristic strategy to counter preprocessing attacks by feeding a small amount of randomness to the cryptographic primitive. We present general and tig

intention 发表于 2025-3-23 19:12:40

Algebraic Structure of the Iterates of eralized .-maps. We show that these maps form an Abelian group which is isomorphic to the group of units in .. Using this isomorphism we easily obtain closed-form expressions for iterates of . and explain their properties.

铁砧 发表于 2025-3-24 00:38:02

http://reply.papertrans.cn/17/1673/167235/167235_14.png

ZEST 发表于 2025-3-24 03:00:48

Information-Theoretic Security with Asymmetriesrsaries against indistinguishability security notions in symmetric-key cryptography. We take the cost model as an input, so that this becomes a purely information-theoretical question..We propose power bounds as an easy-to-use alternative for advantage bounds in the context of indistinguishability w

Addictive 发表于 2025-3-24 09:04:32

http://reply.papertrans.cn/17/1673/167235/167235_16.png

overture 发表于 2025-3-24 14:32:19

http://reply.papertrans.cn/17/1673/167235/167235_17.png

Clumsy 发表于 2025-3-24 18:13:27

http://reply.papertrans.cn/17/1673/167235/167235_18.png

Ventilator 发表于 2025-3-24 22:56:08

Meilensteine der Nationalökonomiesults. In particular, combining the FreeLunch attack with a new technique to bypass 3 rounds of ., we recover a CICO solution for 7 out of 10 rounds of . in less than four hours on one core of AMD EPYC 7352 (2.3 GHz).

整理 发表于 2025-3-25 02:00:17

https://doi.org/10.1007/978-3-540-85271-1of KASUMI with AVX2 instructions, and designed a specific TMTO implementation to get around the SSD access latency. As a motivating example, an attacker passively eavesdropping a GSM communication between a target and a base station can decrypt any 2-h call with probability 0.43, in 14 min.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2024; 44th Annual Internat Leonid Reyzin,Douglas Stebila Conference proceedings 2024 International Associat