DEMUR 发表于 2025-3-28 16:32:02

Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN,lternating block ciphers. The algorithm was previously used by Cho to compute estimates of expected squared correlations and capacities of multidimensional linear approximations of PRESENT. The goal of this paper is to investigate the applicability and usefulness of this algorithm for a nonbinar

Relinquish 发表于 2025-3-28 21:28:55

Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraichave optimal algebraic degree and good nonlinearity. Further, we prove that the functions of this class have at least sub-maximum algebraic immunity. We also check that, at least for small values of the number of variables, the functions of this class have very good nonlinearity, maximum algebraic i

Ptosis 发表于 2025-3-29 00:30:20

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Ges. The main idea behind our attack is creating several look-up tables and finally recovering the initial states of .. and .. synchronously, by alternatively deriving the initial states of .. and .. along the chains. We show that our attack is more efficient, and improves the previous attacks on the

depreciate 发表于 2025-3-29 03:23:26

curing InfiniBand networks with encryption and packet inspection. Unfortunately, the performance benefits realized via the use of remote direct memory access by InfiniBand are at odds with many kernel-stack-based IP datagram encryption and network monitoring technologies. As a result, it is necessar

Fortuitous 发表于 2025-3-29 11:04:38

http://reply.papertrans.cn/47/4654/465369/465369_45.png

capsaicin 发表于 2025-3-29 15:29:28

Sk Subidh Ali,Debdeep Mukhopadhyay tools, such as debuggers and application profilers, do not support tracing through heterogeneous executions that span multiple hosts. In a decentralized system, each host maintains the authoritative record of its own activity in the form of a dependency graph. Reconstructing the provenance of an ob

subacute 发表于 2025-3-29 17:05:52

http://reply.papertrans.cn/47/4654/465369/465369_47.png

HAIL 发表于 2025-3-29 23:14:54

Yang Li,Kazuo Ohta,Kazuo Sakiyamactor: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, tra

逢迎春日 发表于 2025-3-30 03:11:53

http://reply.papertrans.cn/47/4654/465369/465369_49.png

AXIOM 发表于 2025-3-30 05:45:25

http://reply.papertrans.cn/47/4654/465369/465369_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security and Cryptology; 8th International Co Mirosław Kutyłowski,Moti Yung Conference proceedings 2013 Springer-Verlag Berlin