Motilin 发表于 2025-3-25 22:41:07
Yuichi Komano,Kazuo Ohta,Atsushi Shimbo,Shinichi Kawamuramolest 发表于 2025-3-26 00:25:00
http://reply.papertrans.cn/47/4653/465277/465277_26.pngpatriarch 发表于 2025-3-26 07:56:13
Information Security978-3-540-38343-7Series ISSN 0302-9743 Series E-ISSN 1611-3349floaters 发表于 2025-3-26 09:56:27
http://reply.papertrans.cn/47/4653/465277/465277_28.pngLATE 发表于 2025-3-26 12:42:24
Related-Key Rectangle Attack on 42-Round SHACAL-2length key of up to 512 bits. In this paper, we present a related-key rectangle attack on 42-round SHACAL-2, which requires 2. related-key chosen plaintexts and has a running time of 2.. This is the best currently known attack on SHACAL-2.Generic-Drug 发表于 2025-3-26 18:08:11
Cryptanalysis of Variants of UOVables. UOV has . equations and . variables, where . = . and . = .+.. In this paper, we define the weak key of UOV and study how to find the weak key from the public key. Second, we study the security when . > .. And our result shows that the security strengths of the current version of TTS, TRMS, Rainbow and MFE are 2. ~2. 3DES operations.diabetes 发表于 2025-3-26 22:03:36
, A Stream Cipher Construction Inspired by Block Cipher Design Principlesed in block ciphers by equivalent stream cipher components. In order to illustrate this approach, we construct a very simple synchronous stream cipher which provides a lot of flexibility for hardware implementations, and seems to have a number of desirable cryptographic properties.珊瑚 发表于 2025-3-27 03:48:38
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465277.jpgFeedback 发表于 2025-3-27 07:57:29
Protecting Data Privacy Through Hard-to-Reverse Negative Databasesast to the single . approach of previous work. Finally, we present a method for creating negative databases that are hard to reverse in practice, i.e., from which it is hard to obtain ., by adapting a technique for generating 3-SAT formulas.多嘴 发表于 2025-3-27 10:18:36
http://reply.papertrans.cn/47/4653/465277/465277_34.png