龙虾 发表于 2025-3-30 08:17:38

Improved Fast Correlation Attack Using Low Rate Codesas typically been around .=1/2.. Our algorithm has low computational complexity and is able to use code rates around .=1/2.. This way we get much more information about the key bits. Furthermore, the run time for a successful attack is reduced significantly and we need fewer key stream bits.

BRAVE 发表于 2025-3-30 15:22:21

http://reply.papertrans.cn/25/2406/240569/240569_52.png

chemical-peel 发表于 2025-3-30 19:50:46

http://reply.papertrans.cn/25/2406/240569/240569_53.png

Processes 发表于 2025-3-30 20:45:45

http://reply.papertrans.cn/25/2406/240569/240569_54.png

放纵 发表于 2025-3-31 04:48:33

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/240569.jpg

TOXIN 发表于 2025-3-31 07:13:39

The Reality for Women Scholars,Separating codes have recently been applied in the construction of collusion secure fingerprinting schemes. They are related to other combinatorial concepts like intersecting codes, superimposed codes, hashing families, and group testing. In this paper we study some good, binary asymptotic constructions of such codes.

excursion 发表于 2025-3-31 12:18:49

Windows Registry Forensics Part 2,We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in fits our general framework and moreover that our method of analysis leads to a more efficient security reduction.

蘑菇 发表于 2025-3-31 17:04:44

http://reply.papertrans.cn/25/2406/240569/240569_58.png

情节剧 发表于 2025-3-31 20:17:51

Separating and Intersecting Properties of BCH and Kasami CodesSeparating codes have recently been applied in the construction of collusion secure fingerprinting schemes. They are related to other combinatorial concepts like intersecting codes, superimposed codes, hashing families, and group testing. In this paper we study some good, binary asymptotic constructions of such codes.

CBC471 发表于 2025-4-1 01:43:41

A General Construction of IND-CCA2 Secure Public Key EncryptionWe propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in fits our general framework and moreover that our method of analysis leads to a more efficient security reduction.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Cryptography and Coding; 9th IMA Internationa Kenneth G. Paterson Conference proceedings 2003 Springer-Verlag Berlin Heidelberg 2003 authen