遗传 发表于 2025-3-30 12:06:16
http://reply.papertrans.cn/47/4654/465360/465360_51.png慢慢流出 发表于 2025-3-30 13:55:45
http://reply.papertrans.cn/47/4654/465360/465360_52.png性行为放纵者 发表于 2025-3-30 16:46:03
Non-interactive Deniable Authentication Protocols,a key-compromise-impersonation attack. We analyze some NIDA protocols in the model, and we find that no one is satisfactory. We give a new paradigm to construct an NIDA protocol, which is provably secure in the model.装饰 发表于 2025-3-30 21:53:12
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3,loiting the bias in the carry cells of a Galois FCSR. In order to resist this attack, at SAC 2009 F. Arnault . proposed the new stream cipher F-FCSR-H v3 based upon a ring FCSR. M. Hell and T. Johansson only presented experimental results but no theoretical results for the success probability of thesperse 发表于 2025-3-31 03:05:02
Efficient Self-certified Signatures with Batch Verification,e concept of . public key was put forth by Girault. In this paper, we propose an efficient and novel self-certified signature scheme, which requires only one modular multiplication in signing with pre-computation. One of features of our scheme lies in its batch verification in both single-signer andprosthesis 发表于 2025-3-31 06:11:32
http://reply.papertrans.cn/47/4654/465360/465360_56.pngesoteric 发表于 2025-3-31 10:50:41
http://reply.papertrans.cn/47/4654/465360/465360_57.png印第安人 发表于 2025-3-31 14:41:14
Weak-Key Class of MISTY1 for Related-Key Differential Attack,e algorithm, a weak-key class encompassing 2. weak keys of MISTY1 is found. Then we present 7-round related-key differential characteristics of MISTY1 under the weak-key class, which lead to the attacks on the 8-round MISTY1 without the first . lay. The attack requires 2. chosen ciphertexts, and thePituitary-Gland 发表于 2025-3-31 17:37:18
Cryptanalysis of Reduced-Round KLEIN Block Cipher,st investigate the security of KLEIN against truncated differential analysis. We construct a 6-round truncated differential distinguisher based on a careful observation about the characteristic of KLEIN round function. With the help of this new distinguisher, we give a truncated differential analysi珍奇 发表于 2025-3-31 23:05:59
An Efficient RSA Implementation without Precomputation,putation. Precomputation improves the speed and in the meanwhile makes the algorithms more complex. The complex algorithms are not suitable for hardware implementation. We propose a new algorithm without precomputation, which is more efficient even compared with the ones with precomputation. Our alg