兵团 发表于 2025-3-26 21:09:57
http://reply.papertrans.cn/32/3131/313078/313078_31.pngIndigence 发表于 2025-3-27 04:01:13
http://reply.papertrans.cn/32/3131/313078/313078_32.png利用 发表于 2025-3-27 05:21:21
http://reply.papertrans.cn/32/3131/313078/313078_33.png流浪 发表于 2025-3-27 10:49:03
http://reply.papertrans.cn/32/3131/313078/313078_34.png窗帘等 发表于 2025-3-27 16:07:01
Weak Keys of the Block Cipher SEED-192 for Related-Key Differential AttacksIn this paper, we analyze the block cipher SEED-192 which is an extended version of the ISO/IEC block cipher SEED. According to the result of this paper, there exist weak keys in 8 out of 20 rounds of SEED-192 against related-key differential attacks. This is the first cryptanalytic result for the key schedule of SEED-192.种植,培养 发表于 2025-3-27 21:34:41
Panel: Authentication in Constrained EnvironmentsThis paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-written notes.背景 发表于 2025-3-28 00:42:47
http://reply.papertrans.cn/32/3131/313078/313078_37.png太空 发表于 2025-3-28 03:28:09
http://reply.papertrans.cn/32/3131/313078/313078_38.pngProstatism 发表于 2025-3-28 09:39:57
The utility and drawbacks of traditional approaches Comment 3,Narasimha‘s paper has touched on many important issues relative to the utility of the statistical approach to turbulence. I shall use his organization of topics, but will respond to only a few issues he raises. My own comments stress-perhaps more than his-two-point closures, and their possible contributions and defects.分开 发表于 2025-3-28 13:29:23
A Server-Assisted Hash-Based Signature SchemeWe present a practical digital signature scheme built from a cryptographic hash function and a hash-then-publish digital time-stamping scheme. We also provide a simple proof of existential unforgeability against adaptive chosen-message attack (EUF-ACM) in the random oracle (RO) model.