Motilin 发表于 2025-3-25 22:41:07

Yuichi Komano,Kazuo Ohta,Atsushi Shimbo,Shinichi Kawamura

molest 发表于 2025-3-26 00:25:00

http://reply.papertrans.cn/47/4653/465277/465277_26.png

patriarch 发表于 2025-3-26 07:56:13

Information Security978-3-540-38343-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

floaters 发表于 2025-3-26 09:56:27

http://reply.papertrans.cn/47/4653/465277/465277_28.png

LATE 发表于 2025-3-26 12:42:24

Related-Key Rectangle Attack on 42-Round SHACAL-2length key of up to 512 bits. In this paper, we present a related-key rectangle attack on 42-round SHACAL-2, which requires 2. related-key chosen plaintexts and has a running time of 2.. This is the best currently known attack on SHACAL-2.

Generic-Drug 发表于 2025-3-26 18:08:11

Cryptanalysis of Variants of UOVables. UOV has . equations and . variables, where . = . and . = .+.. In this paper, we define the weak key of UOV and study how to find the weak key from the public key. Second, we study the security when . > .. And our result shows that the security strengths of the current version of TTS, TRMS, Rainbow and MFE are 2. ~2. 3DES operations.

diabetes 发表于 2025-3-26 22:03:36

, A Stream Cipher Construction Inspired by Block Cipher Design Principlesed in block ciphers by equivalent stream cipher components. In order to illustrate this approach, we construct a very simple synchronous stream cipher which provides a lot of flexibility for hardware implementations, and seems to have a number of desirable cryptographic properties.

珊瑚 发表于 2025-3-27 03:48:38

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465277.jpg

Feedback 发表于 2025-3-27 07:57:29

Protecting Data Privacy Through Hard-to-Reverse Negative Databasesast to the single . approach of previous work. Finally, we present a method for creating negative databases that are hard to reverse in practice, i.e., from which it is hard to obtain ., by adapting a technique for generating 3-SAT formulas.

多嘴 发表于 2025-3-27 10:18:36

http://reply.papertrans.cn/47/4653/465277/465277_34.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security; 9th International Co Sokratis K. Katsikas,Javier López,Bart Preneel Conference proceedings 2006 Springer-Verlag Berli