dissent 发表于 2025-3-28 17:44:07

http://reply.papertrans.cn/23/2289/228846/228846_41.png

黄瓜 发表于 2025-3-28 21:43:47

https://doi.org/10.1007/978-3-030-01701-9nables the scheme to have small key sizes, while the structure of LDPC codes helps to achieve good overall performance. In this paper, we discuss the security of this code-based signature scheme. In particular, we present a partial key recovery attack that uses a statistical method to recover an imp

Glossy 发表于 2025-3-29 02:58:52

Raheem Beyah,Bing Chang,Sencun Zhuction between Gowers uniformity norm of a function and its correlation with polynomials of a certain degree. Gowers . and . norms measure the resistance of a Boolean function against linear and quadratic approximations, respectively. This paper presents computational results on the Gowers . and . no

Indelible 发表于 2025-3-29 06:12:04

Yao Guo,Junming Ma,Wenjun Wu,Xiangqun Chen independently and non-interactively setup their own pairs of public- and secret-keys. Each user ., with knowledge of the public-keys of all other participants, its own secret-key, an identifier . and a functionality ., can encode its own input . to produce a ciphertext .. There is a public evaluati

anagen 发表于 2025-3-29 11:16:18

Jidong Xiao,Hai Huang,Haining Wangr titled ‘Indifferentiability of Confusion-Diffusion Networks’, Dodis et al. theorized such SPNs as . and established their provable security in Maurer’s indifferentiability framework. Guo et al. extended this work to . Confusion-Diffusion networks (NLCDNs), i.e., networks using non-linear permutati

avarice 发表于 2025-3-29 13:53:19

Hong Liu,Hongmin Li,Eugene Y. Vassermantack on 5 rounds Feistel schemes in . quantum complexity and an attack on Benes schemes in . quantum complexity, where . is the number of bits of the internal random functions. This improves the best known attack in . (before our attack).

中古 发表于 2025-3-29 17:09:07

http://reply.papertrans.cn/23/2289/228846/228846_47.png

Collected 发表于 2025-3-29 22:51:44

http://reply.papertrans.cn/23/2289/228846/228846_48.png

使迷醉 发表于 2025-3-30 02:53:13

http://reply.papertrans.cn/23/2289/228846/228846_49.png

Arboreal 发表于 2025-3-30 05:12:42

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/228846.jpg
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Codes, Cryptology and Information Security; 4th International Co Said El Hajji,Sihem Mesnager,El Mamoun Souidi Conference proceedings 2023