meritorious 发表于 2025-3-25 04:43:50

http://reply.papertrans.cn/17/1673/167235/167235_21.png

特征 发表于 2025-3-25 09:49:31

http://reply.papertrans.cn/17/1673/167235/167235_22.png

不能平静 发表于 2025-3-25 11:50:46

Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximationsh cryptanalysis in the related-key model. We apply the method to sponge-based hash function ., XOFs ./. and AEAD ., etc. Accelerated preimage or key-recovery attacks are obtained. Note that all the differential-linear distinguishers employed in this work are highly biased and thus can be experimentally verified.

gerrymander 发表于 2025-3-25 18:08:52

http://reply.papertrans.cn/17/1673/167235/167235_24.png

使习惯于 发表于 2025-3-25 20:16:55

http://reply.papertrans.cn/17/1673/167235/167235_25.png

自作多情 发表于 2025-3-26 02:14:52

Probabilistic Linearization: Internal Differential Collisions in up to 6 Rounds of SHA-3ternal differentials, leading to the best collision attacks on four round-reduced variants of the . instances. In particular, the number of attacked rounds is extended to 5 from 4 for ., and to 6 from 5 for ..

HAWK 发表于 2025-3-26 05:06:09

Information-Theoretic Security with Asymmetriesn..As the final and perhaps most useful contribution, we provide two methods to convert single-user power bounds into multi-user power bounds, and investigate their relation to the point-wise proximity method of Hoang and Tessaro (Crypto 2016). These method are applied to obtain tight multi-user power bounds for . and ..

cushion 发表于 2025-3-26 11:48:10

Conference proceedings 2024VI: Cryptanalysis; new primitives; side-channels and leakage;..Part VII: Quantum cryptography; threshold cryptography;..Part VIII: Multiparty computation;..Part IX: Multiparty computation; private information retrieval; zero-knowledge;..Part X: Succinct arguments... .

ovation 发表于 2025-3-26 14:14:00

Advances in Cryptology – CRYPTO 2024978-3-031-68385-5Series ISSN 0302-9743 Series E-ISSN 1611-3349

gregarious 发表于 2025-3-26 17:13:41

Grundlagen empirischer Forschungeralized .-maps. We show that these maps form an Abelian group which is isomorphic to the group of units in .. Using this isomorphism we easily obtain closed-form expressions for iterates of . and explain their properties.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2024; 44th Annual Internat Leonid Reyzin,Douglas Stebila Conference proceedings 2024 International Associat