foppish 发表于 2025-3-28 15:03:00

http://reply.papertrans.cn/47/4654/465318/465318_41.png

奇思怪想 发表于 2025-3-28 22:39:18

http://reply.papertrans.cn/47/4654/465318/465318_42.png

西瓜 发表于 2025-3-29 02:04:49

http://reply.papertrans.cn/47/4654/465318/465318_43.png

Substitution 发表于 2025-3-29 03:20:50

Redactable Signatures for Independent Removal of Structure and Contentms when structure is not separated from content, resulting in an attack on the scheme proposed at VLDB ’08 by . and .. The attack allows for changing the semantic meaning of a given tree. We introduce a rigid security model, including consecutive redaction control, to formalize the required behaviou

insert 发表于 2025-3-29 07:18:02

http://reply.papertrans.cn/47/4654/465318/465318_45.png

侵蚀 发表于 2025-3-29 13:45:26

Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attackced to show the plaintext and the used random numbers in encryption, a deniable encryption scheme behaves like only an innocent message is encrypted. Because it protects privacy against malicious coercer, the deniable encryption is very useful in communication systems such as the cloud storage syste

Endearing 发表于 2025-3-29 17:24:52

http://reply.papertrans.cn/47/4654/465318/465318_47.png

平淡而无味 发表于 2025-3-29 23:30:41

New Impossible Differential Attacks on Camelliaund impossible differentials of Camellia with 2 ./.. layers, which turn out to be the first 7-round impossible differentials with 2 ./.. layers. Combined with some basic techniques including the early abort approach and the key schedule consideration, we achieve the impossible differential attacks o

Inflamed 发表于 2025-3-30 03:06:29

Impossible Differential Attacks on Reduced-Round LBlockrms. In this paper, by exploiting the structure of LBlock and the redundancy in its key schedule, we propose an impossible differential attack on 21-round LBlock based on a 14-round impossible differential. The data and time complexities are about 2. chosen plaintexts and 2. 21-round encryptions, re

declamation 发表于 2025-3-30 06:42:41

New Truncated Differential Cryptanalysis on 3D Block Ciphery-recovery attack broke only 10 rounds with the impossible differential attack. 3D is an AES-based block cipher proposed at CANS 2008, which operates on 512-bit blocks and a 512-bit key, and consists of 22 rounds. It was previously believed that the truncated differential cryptanalysis could not ext
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Practice and Experience; 8th International Co Mark D. Ryan,Ben Smyth,Guilin Wang Conference proceedings 2012 Springer-