endure 发表于 2025-3-26 23:12:36
Harald Schuh,Jens Wickert,Mike Sips,Tilo Schöne,Christian Rogaß,Sigrid Roessner,Rolf König,Volker Klgraphy. Primitives that rely on order-finding problems, such as factoring and computing Discrete Logarithms, can be broken by Shor’s algorithm ([.])..Symmetric primitives, at first sight, seem less impacted by the arrival of quantum computers: Grover’s algorithm [.] for searching in an unstructured详细目录 发表于 2025-3-27 04:58:32
http://reply.papertrans.cn/43/4235/423408/423408_32.png招惹 发表于 2025-3-27 06:09:10
Andreas Wieser,Heiner Kuhlmann,Volker Schwieger,Wolfgang Niemeierike Bitcoin. The existing PoS are based on rather sophisticated graph pebbling lower bounds. Much simpler and in several aspects more efficient schemes based on inverting random functions have been suggested, but they don’t give meaningful security guarantees due to existing time-memory trade-offs..auxiliary 发表于 2025-3-27 11:21:07
Heiner Kuhlmann,Lasse Klingbeilciphers. It is shown that, with minor modifications to some of the round constants, Midori-64 has a nonlinear invariant with . corresponding weak keys. Furthermore, this invariant corresponds to a linear hull with maximal correlation. By combining the new invariant with integral cryptanalysis, a praPetechiae 发表于 2025-3-27 13:58:34
http://reply.papertrans.cn/43/4235/423408/423408_35.pngcontrast-medium 发表于 2025-3-27 18:45:28
Heinz Döring,Wolfgang Habel,Werner Lienhart,Willfried Schwarzly encrypts strings of length in .. All currently known constructions are only proven secure up to the birthday bound, and for all but one construction this bound is known to be tight. We consider the remaining candidate, . by Chen et al. (ToSC 2017(3)), and prove that it achieves beyond the birthdaintention 发表于 2025-3-27 22:50:28
http://reply.papertrans.cn/43/4235/423408/423408_37.pngMelanoma 发表于 2025-3-28 05:58:24
Maria Hennese of the 20 proposed signature schemes that are being considered for standardization. Walnut relies on a one-way function called E-Multiplication, which has a rich algebraic structure. This paper shows that this structure can be exploited to launch several practical attacks against the Walnut crypto寡头政治 发表于 2025-3-28 06:44:33
http://reply.papertrans.cn/43/4235/423408/423408_39.png绊住 发表于 2025-3-28 11:05:04
Willi Freeden,Reiner RummelEin Buch auf dem aktuellen Wissensstand für den Praktiker.Von führenden ?Autoren mit Praxisbezug verfasst.Berücksichtigt dier mathematisch-physikalischen Grundlagen ebenso wie Satellitenkunde oder GIS