连结 发表于 2025-3-21 16:41:10
书目名称Cryptology and Network Security影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0240598<br><br> <br><br>书目名称Cryptology and Network Security读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0240598<br><br> <br><br>细颈瓶 发表于 2025-3-21 21:10:17
http://reply.papertrans.cn/25/2406/240598/240598_2.png纠缠 发表于 2025-3-22 03:28:02
New Impossible Differential Cryptanalysis of Reduced-Round Camelliaossible differential of Camellia including ./.. layer. Utilizing impossible differential attack, 10-round Camellia-128 is breakable with 2. chosen plaintexts and 2. 10 round encryptions. Moreover, 10-round Camellia-192 and 11-round Camellia-256 can also be analyzed, the time complexity are about 2.sed-rate 发表于 2025-3-22 05:13:45
http://reply.papertrans.cn/25/2406/240598/240598_4.pngACE-inhibitor 发表于 2025-3-22 10:12:33
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48 rounds of PRINTCipher-48 and 9 rounds under some additional assumptions with only 2 known plaintexts faster than brute force. We show that it is possible to break the full 48-round cipher by assuming a moderate leakage of internal state bits or even just Hamming weights of some three-bit states. Su–FER 发表于 2025-3-22 15:09:08
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryptionode (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main cipher structure and customized key schedule design which provides strong protection against r–FER 发表于 2025-3-22 20:07:30
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structureslayers. For Type 2 GFS, at FSE 2010, Suzaki and Minematsu showed that a better diffusion property can be obtained if one uses some other sub-block-wise permutation. In this paper, we consider Type 1, Source-Heavy (SH), and Target-Heavy (TH) GFSs, and study if their diffusion properties can be improvaphasia 发表于 2025-3-22 22:01:54
Security Analysis of an Improved MFE Public Key Cryptosystemng et al gave an improvement of MFE. They claimed that the improved MFE is secure against high order linearization equation attack. However, through theoretical analysis, we find that there are many first order linearization equations(FOLEs) satisfied by this improved version. Using linearization eqpadding 发表于 2025-3-23 03:47:24
http://reply.papertrans.cn/25/2406/240598/240598_9.pngLimited 发表于 2025-3-23 07:29:21
http://reply.papertrans.cn/25/2406/240598/240598_10.png