correspondent 发表于 2025-3-28 15:55:32

Towards Security Notions for White-Box Cryptographyy focuses on software implementations of cryptographic primitives in an application. The aim of WBC is to resist attacks from an adversary having access to some ‘executable’ code with an embedded secret key. WBC, if possible, would have several applications. However, unlike obfuscation, it lacks a t

Intuitive 发表于 2025-3-28 18:56:57

http://reply.papertrans.cn/47/4653/465256/465256_42.png

集中营 发表于 2025-3-29 02:19:26

Structural Attacks on Two SHA-3 Candidates: Blender-, and DCH-,est in the academic world as well as in industry. There are 51 round one candidates building on sometimes very different principles..In this paper, we show how to attack two of the 51 round one hash functions. The attacks have in common that they exploit structural weaknesses in the design of the ha

phlegm 发表于 2025-3-29 04:53:42

http://reply.papertrans.cn/47/4653/465256/465256_44.png

相信 发表于 2025-3-29 09:37:41

On Free-Start Collisions and Collisions for TIB3essage modification techniques the complexity can be further reduced to 2.. Furthermore, we show how to construct collisions for TIB3 slightly faster than brute force search using the fact that we can construct several (different) free-start collisions for the compression function. The complexity to

Cholagogue 发表于 2025-3-29 15:03:55

Detection of Database Intrusion Using a Two-Stage Fuzzy Systemas past behavior. A first-order Sugeno fuzzy model is used to compute an initial belief for each transaction. Whether the current transaction is genuine, suspicious or intrusive is first decided based on this belief. If a transaction is found to be suspicious, its posterior belief is computed using

inculpate 发表于 2025-3-29 17:29:22

http://reply.papertrans.cn/47/4653/465256/465256_47.png

量被毁坏 发表于 2025-3-29 20:16:11

http://reply.papertrans.cn/47/4653/465256/465256_48.png

性上瘾 发表于 2025-3-29 23:52:53

http://reply.papertrans.cn/47/4653/465256/465256_49.png

detach 发表于 2025-3-30 07:45:17

http://reply.papertrans.cn/47/4653/465256/465256_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security; 12th International C Pierangela Samarati,Moti Yung,Claudio A. Ardagna Conference proceedings 2009 Springer-Verlag Ber