担忧 发表于 2025-3-25 05:42:08

http://reply.papertrans.cn/47/4654/465369/465369_21.png

悦耳 发表于 2025-3-25 07:42:00

https://doi.org/10.1007/978-3-642-38519-3algebraic cryptanalysis; authentication; linear attacks; security protocols; visual cryptography

空洞 发表于 2025-3-25 14:38:24

Fast Evaluation of T-Functions via Time-Memory Trade-Offs,We present two low time-cost methods to evaluate arbitrary T-function on .-bit words; both methods use only fast computer instructions (integer addition and/or bitwise logical instructions) and calls to memory. The methods can be applied in a design of T-function-based stream ciphers for fast encryption software in heavy-traffic networks.

树木心 发表于 2025-3-25 17:36:23

http://reply.papertrans.cn/47/4654/465369/465369_24.png

barium-study 发表于 2025-3-25 21:23:41

http://reply.papertrans.cn/47/4654/465369/465369_25.png

AMOR 发表于 2025-3-26 03:51:25

http://reply.papertrans.cn/47/4654/465369/465369_26.png

Handedness 发表于 2025-3-26 06:11:01

http://reply.papertrans.cn/47/4654/465369/465369_27.png

Vaginismus 发表于 2025-3-26 08:49:31

http://reply.papertrans.cn/47/4654/465369/465369_28.png

结构 发表于 2025-3-26 13:00:37

An Extension of Fault Sensitivity Analysis Based on Clockwise Collision,y of calculations against the fault injections. While the clockwise collision fault sensitivity analysis (CC-FSA) uses the fault injections to detect the occurrence of the clockwise collision and to recover the secret key. Clockwise collision is a phenomenon for iterative hardware circuits, which le

上釉彩 发表于 2025-3-26 17:00:08

http://reply.papertrans.cn/47/4654/465369/465369_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology; 8th International Co Mirosław Kutyłowski,Moti Yung Conference proceedings 2013 Springer-Verlag Berlin