找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Applications; 12th International W Souhwan Jung,Moti Yung Conference proceedings 2012 Springer-Verlag GmbH Berlin Heid

[复制链接]
楼主: patch-test
发表于 2025-3-23 13:53:34 | 显示全部楼层
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward,cture technique optimized for ARIRANG that overcomes the use of the feed-forward to the middle. This enables us to find preimages of full steps ARIRANG-256 and ARIRANG-512 with 2. and 2. compression function operations and 2. and 2. amount of memory, respectively. These are the first results breaking the security of ARIRANG as a hash function.
发表于 2025-3-23 18:46:16 | 显示全部楼层
Known-Key Distinguisher on Round-Reduced 3D Block Cipher,sequent attack. We extend the differential trail to 15 rounds and give a known-key distinguisher based on the 15-round differential path. The complexity of finding a right pair is 2., which is clearly lower than the complexity of generic attack.
发表于 2025-3-23 22:32:16 | 显示全部楼层
发表于 2025-3-24 05:44:11 | 显示全部楼层
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts,LO scheme. Instead of the Euclidean middle range gap, we map the probabilistic middle range gap to a domain gap. Our simulation shows that the proposed method is effective for various distributions and especially for distributions with small variance.
发表于 2025-3-24 10:08:12 | 显示全部楼层
A Map-Layer-Based Access Control Model, Combination Theory is defined here. Then we can overlay the authorization layers to map layers in authorization evaluation, which is more efficient. At last some propagation rules are defined to makes authorization simpler and more flexible. . environment.
发表于 2025-3-24 14:32:38 | 显示全部楼层
Generalized Security Analysis of the Random Key Bits Leakage Attack, same as the case when a fraction of three private RSA keys are leaked. In Takagi’s case, we find that the asymmetricity in two factors of the modulus give some effects on the resistance against the attack.
发表于 2025-3-24 15:36:59 | 显示全部楼层
发表于 2025-3-24 22:41:36 | 显示全部楼层
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensll have transplantation surgery for the secret to be redistributed. In this paper, we proposed the secure communication scheme only using symmetric cryptosystem without a pre-deployed key between a central device and each biosensor in BSNs.
发表于 2025-3-24 23:42:46 | 显示全部楼层
发表于 2025-3-25 06:58:54 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465288.jpg
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-26 03:35
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表