意外的成功 发表于 2025-3-23 11:43:50

Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification

发表于 2025-3-23 17:17:10

http://reply.papertrans.cn/25/2407/240606/240606_12.png

散布 发表于 2025-3-23 19:05:40

http://reply.papertrans.cn/25/2407/240606/240606_13.png

袋鼠 发表于 2025-3-23 23:55:35

on A2U2 under the known-plaintext-attack model, which only needs at most 210 consecutive ciphertext bits and its corresponding plaintext with the time complexity about 2.. Our result is much better than that of the attack proposed by M. Abdelraheem et al. in whose complexity is .(2.×.), where .

Opponent 发表于 2025-3-24 02:24:59

http://reply.papertrans.cn/25/2407/240606/240606_15.png

掺假 发表于 2025-3-24 10:29:35

ge recovery attacks on this cryptosystem. The first one is a broadcast attack: a single message of . bits can be recovered if it is encrypted for . recipients. The second attack is a multiple transmission attack in which a message can be recovered with a probability of (1 − 2.). if it is encrypted u

消灭 发表于 2025-3-24 11:29:15

http://reply.papertrans.cn/25/2407/240606/240606_17.png

发酵剂 发表于 2025-3-24 17:59:58

cks include the use of differential and linear relation patterns that allow to bypass the diffusion provided by MDS codes altogether. Therefore, we can attack only a single IDEA instance out of . copies, effectively using a narrow trail for the propagation of differences and masks across WIDEA-.. In

AGOG 发表于 2025-3-24 22:30:06

and Japan. MULTI2 uses the Feistel structure and operates on the 64-bit blocks. The encryption key has 256 bits..This paper studies the linear analysis on MULTI2. We give a detailed bias analysis on MULTI2 round functions. For the first time formal proofs on their bias properties are given. This all

META 发表于 2025-3-25 01:08:36

http://reply.papertrans.cn/25/2407/240606/240606_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Cryptology and Network Security; 11th International C Josef Pieprzyk,Ahmad-Reza Sadeghi,Mark Manulis Conference proceedings 2012 Springer-V