取消 发表于 2025-3-23 09:58:51
http://reply.papertrans.cn/17/1673/167235/167235_11.pngFerritin 发表于 2025-3-23 17:26:26
Tight Characterizations for Preprocessing Against Cryptographic Saltingin both theory and practice: an efficient online attacker can take advantage of advice prepared by a time-consuming preprocessing stage..Salting is a heuristic strategy to counter preprocessing attacks by feeding a small amount of randomness to the cryptographic primitive. We present general and tigintention 发表于 2025-3-23 19:12:40
Algebraic Structure of the Iterates of eralized .-maps. We show that these maps form an Abelian group which is isomorphic to the group of units in .. Using this isomorphism we easily obtain closed-form expressions for iterates of . and explain their properties.铁砧 发表于 2025-3-24 00:38:02
http://reply.papertrans.cn/17/1673/167235/167235_14.pngZEST 发表于 2025-3-24 03:00:48
Information-Theoretic Security with Asymmetriesrsaries against indistinguishability security notions in symmetric-key cryptography. We take the cost model as an input, so that this becomes a purely information-theoretical question..We propose power bounds as an easy-to-use alternative for advantage bounds in the context of indistinguishability wAddictive 发表于 2025-3-24 09:04:32
http://reply.papertrans.cn/17/1673/167235/167235_16.pngoverture 发表于 2025-3-24 14:32:19
http://reply.papertrans.cn/17/1673/167235/167235_17.pngClumsy 发表于 2025-3-24 18:13:27
http://reply.papertrans.cn/17/1673/167235/167235_18.pngVentilator 发表于 2025-3-24 22:56:08
Meilensteine der Nationalökonomiesults. In particular, combining the FreeLunch attack with a new technique to bypass 3 rounds of ., we recover a CICO solution for 7 out of 10 rounds of . in less than four hours on one core of AMD EPYC 7352 (2.3 GHz).整理 发表于 2025-3-25 02:00:17
https://doi.org/10.1007/978-3-540-85271-1of KASUMI with AVX2 instructions, and designed a specific TMTO implementation to get around the SSD access latency. As a motivating example, an attacker passively eavesdropping a GSM communication between a target and a base station can decrypt any 2-h call with probability 0.43, in 14 min.