grieve 发表于 2025-3-25 03:53:37

http://reply.papertrans.cn/25/2406/240598/240598_21.png

脱落 发表于 2025-3-25 09:03:28

y Pan and Deng shows that it is not secure. In this paper, we present a new efficient lattice-based public-key cryptosystem mixed with a knapsack, which can resist Pan and Deng’s attack well. What’s more, it has reasonable key size, quick encryption and decryption. However, we have to point out that the new cryptosystem has no security proof.

Canyon 发表于 2025-3-25 12:51:16

Kriterien zur Schadensbewertung,In this survey, we review a number of the many “expressive” encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them.

catagen 发表于 2025-3-25 17:34:57

http://reply.papertrans.cn/25/2406/240598/240598_24.png

尊严 发表于 2025-3-25 20:11:11

http://reply.papertrans.cn/25/2406/240598/240598_25.png

食料 发表于 2025-3-26 03:22:46

Kriterien zur Schadensbewertung,has been employed in many Mifare Classic RFID products, Hitag2 is used by many car manufacturers for unlocking car doors remotely. Until now, except the brute force attack, only one cryptanalysis on this cipher was released by Courtois, O’Neil and Quisquater, which broke Hitag2 by an SAT solver with

Audiometry 发表于 2025-3-26 05:02:20

Kriterien zur Werkstoffauswahl,ossible differential of Camellia including ./.. layer. Utilizing impossible differential attack, 10-round Camellia-128 is breakable with 2. chosen plaintexts and 2. 10 round encryptions. Moreover, 10-round Camellia-192 and 11-round Camellia-256 can also be analyzed, the time complexity are about 2.

Cabg318 发表于 2025-3-26 12:11:08

,Thermisch aktivierte Vorgänge,this paper, we analyze the initialization stage of ZUC v1.5. First of all, we study the differential properties of operations in ZUC v1.5, including the bit-reorganization, exclusive-or and addition modulo 2., bit shift and the update of LFSR. And then we give a differential trail covering 24 rounds

大漩涡 发表于 2025-3-26 16:08:22

http://reply.papertrans.cn/25/2406/240598/240598_29.png

definition 发表于 2025-3-26 19:36:35

Atomarer Aufbau kristalliner Stoffe,ode (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main cipher structure and customized key schedule design which provides strong protection against r
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Cryptology and Network Security; 10th International C Dongdai Lin,Gene Tsudik,Xiaoyun Wang Conference proceedings 2011 Springer-Verlag GmbH