meritorious 发表于 2025-3-25 04:43:50
http://reply.papertrans.cn/17/1673/167235/167235_21.png特征 发表于 2025-3-25 09:49:31
http://reply.papertrans.cn/17/1673/167235/167235_22.png不能平静 发表于 2025-3-25 11:50:46
Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximationsh cryptanalysis in the related-key model. We apply the method to sponge-based hash function ., XOFs ./. and AEAD ., etc. Accelerated preimage or key-recovery attacks are obtained. Note that all the differential-linear distinguishers employed in this work are highly biased and thus can be experimentally verified.gerrymander 发表于 2025-3-25 18:08:52
http://reply.papertrans.cn/17/1673/167235/167235_24.png使习惯于 发表于 2025-3-25 20:16:55
http://reply.papertrans.cn/17/1673/167235/167235_25.png自作多情 发表于 2025-3-26 02:14:52
Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3ternal differentials, leading to the best collision attacks on four round-reduced variants of the . instances. In particular, the number of attacked rounds is extended to 5 from 4 for ., and to 6 from 5 for ..HAWK 发表于 2025-3-26 05:06:09
Information-Theoretic Security with Asymmetriesn..As the final and perhaps most useful contribution, we provide two methods to convert single-user power bounds into multi-user power bounds, and investigate their relation to the point-wise proximity method of Hoang and Tessaro (Crypto 2016). These method are applied to obtain tight multi-user power bounds for . and ..cushion 发表于 2025-3-26 11:48:10
Conference proceedings 2024VI: Cryptanalysis; new primitives; side-channels and leakage;..Part VII: Quantum cryptography; threshold cryptography;..Part VIII: Multiparty computation;..Part IX: Multiparty computation; private information retrieval; zero-knowledge;..Part X: Succinct arguments... .ovation 发表于 2025-3-26 14:14:00
Advances in Cryptology – CRYPTO 2024978-3-031-68385-5Series ISSN 0302-9743 Series E-ISSN 1611-3349gregarious 发表于 2025-3-26 17:13:41
Grundlagen empirischer Forschungeralized .-maps. We show that these maps form an Abelian group which is isomorphic to the group of units in .. Using this isomorphism we easily obtain closed-form expressions for iterates of . and explain their properties.