极少 发表于 2025-3-27 00:00:05
layers. For Type 2 GFS, at FSE 2010, Suzaki and Minematsu showed that a better diffusion property can be obtained if one uses some other sub-block-wise permutation. In this paper, we consider Type 1, Source-Heavy (SH), and Target-Heavy (TH) GFSs, and study if their diffusion properties can be improv古文字学 发表于 2025-3-27 03:01:02
ng et al gave an improvement of MFE. They claimed that the improved MFE is secure against high order linearization equation attack. However, through theoretical analysis, we find that there are many first order linearization equations(FOLEs) satisfied by this improved version. Using linearization eqprediabetes 发表于 2025-3-27 08:56:24
y Pan and Deng shows that it is not secure. In this paper, we present a new efficient lattice-based public-key cryptosystem mixed with a knapsack, which can resist Pan and Deng’s attack well. What’s more, it has reasonable key size, quick encryption and decryption. However, we have to point out that俗艳 发表于 2025-3-27 11:43:58
http://reply.papertrans.cn/25/2406/240598/240598_34.pngFriction 发表于 2025-3-27 16:26:17
ration for commercial applications. It became publicly available in 2010 and since then it was neither attacked nor proved to be secure. In this paper, we show that the SM2 key exchange protocol is insecure by presenting realistic attacks in the Canetti-Krawczyk model. The demonstrated attack breaks面包屑 发表于 2025-3-27 17:56:29
http://reply.papertrans.cn/25/2406/240598/240598_36.pngobeisance 发表于 2025-3-27 22:12:08
http://reply.papertrans.cn/25/2406/240598/240598_37.pngGyrate 发表于 2025-3-28 04:40:02
er prove possession of this certified credential to another party, while minimizing the information given to the latter. At CANS 2010, Guajardo, Mennink and Schoenmakers have introduced the concept of anonymous credential schemes with encrypted attributes, where the attributes to be certified are enindoctrinate 发表于 2025-3-28 09:54:16
Henrique Paques,Ling Liu,Calton Puethods require linear amount of work to be performed by unrevoked signers or verifiers, who usually have to obtain fresh update information (sometimes of linear size) published by the group manager. We overcome these disadvantages by proposing a novel group signature scheme, where computation costs泥沼 发表于 2025-3-28 10:51:47
http://reply.papertrans.cn/25/2406/240598/240598_40.png