foppish 发表于 2025-3-28 15:03:00
http://reply.papertrans.cn/47/4654/465318/465318_41.png奇思怪想 发表于 2025-3-28 22:39:18
http://reply.papertrans.cn/47/4654/465318/465318_42.png西瓜 发表于 2025-3-29 02:04:49
http://reply.papertrans.cn/47/4654/465318/465318_43.pngSubstitution 发表于 2025-3-29 03:20:50
Redactable Signatures for Independent Removal of Structure and Contentms when structure is not separated from content, resulting in an attack on the scheme proposed at VLDB ’08 by . and .. The attack allows for changing the semantic meaning of a given tree. We introduce a rigid security model, including consecutive redaction control, to formalize the required behaviouinsert 发表于 2025-3-29 07:18:02
http://reply.papertrans.cn/47/4654/465318/465318_45.png侵蚀 发表于 2025-3-29 13:45:26
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attackced to show the plaintext and the used random numbers in encryption, a deniable encryption scheme behaves like only an innocent message is encrypted. Because it protects privacy against malicious coercer, the deniable encryption is very useful in communication systems such as the cloud storage systeEndearing 发表于 2025-3-29 17:24:52
http://reply.papertrans.cn/47/4654/465318/465318_47.png平淡而无味 发表于 2025-3-29 23:30:41
New Impossible Differential Attacks on Camelliaund impossible differentials of Camellia with 2 ./.. layers, which turn out to be the first 7-round impossible differentials with 2 ./.. layers. Combined with some basic techniques including the early abort approach and the key schedule consideration, we achieve the impossible differential attacks oInflamed 发表于 2025-3-30 03:06:29
Impossible Differential Attacks on Reduced-Round LBlockrms. In this paper, by exploiting the structure of LBlock and the redundancy in its key schedule, we propose an impossible differential attack on 21-round LBlock based on a 14-round impossible differential. The data and time complexities are about 2. chosen plaintexts and 2. 21-round encryptions, redeclamation 发表于 2025-3-30 06:42:41
New Truncated Differential Cryptanalysis on 3D Block Ciphery-recovery attack broke only 10 rounds with the impossible differential attack. 3D is an AES-based block cipher proposed at CANS 2008, which operates on 512-bit blocks and a 512-bit key, and consists of 22 rounds. It was previously believed that the truncated differential cryptanalysis could not ext