有恶臭 发表于 2025-3-23 11:16:47

Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALcollision attack, our method focuses on the multi-collision of the compression function. For MD4, we utilize two different feasible collision differential paths to find a 4-collision with about 2. MD4 computations. For 3-Pass HAVAL, we can find a 4-collision with complexity about 2. and a 8-near-collision with complexity 2..

Apoptosis 发表于 2025-3-23 16:35:52

http://reply.papertrans.cn/47/4654/465375/465375_12.png

anus928 发表于 2025-3-23 21:30:46

Cryptanalysis of a Hash Function Proposed at ICISC 2006A simple method for constructing collisions for Shpilrain’s polynomial-based hash function from ICISC 2006 is presented. The attack relies on elementary linear algebra and can be considered as practical: For the parameters suggested, we give a specific collision, computed by means of a computer algebra system.

Accede 发表于 2025-3-23 22:35:01

Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006ID. In this paper, we present an impossible differential attack on 25-round HIGHT, a related-key rectangle attack on 26-round HIGHT, and finally a related-key impossible differential attack on 28-round HIGHT. Our result suggests that the safety margin of HIGHT decreases from the originally expected

Indelible 发表于 2025-3-24 03:03:09

A Cryptanalysis of the Double-Round Quadratic Cryptosystemlthough these first schemes were broken, many others followed, leading to a very active field known as Multivariate cryptography. In this paper, we show how to break one of these schemes, the Double-Round Quadratic cryptosystem from . We stress that this cryptosystem has, in practice, already be

全神贯注于 发表于 2025-3-24 08:08:38

Improving the Time Complexity of Matsui’s Linear Cryptanalysis Fourier Transform. Using this improvement, the time complexity decreases from .(2.*2.) to .(.*2.), where . is the number of bits in the keyguess. This improvement is very generic and can be applied against a broad variety of ciphers including SPN and Feistel schemes. In certain (practically meaning

不能平静 发表于 2025-3-24 13:46:58

On Large Distributions for Linear Cryptanalysisn . (or a noise variable) be expressed via . mutually independent and uniformly distributed .-bit random variables .., .., ..., ... The possibility to construct its distribution depends on the form of the expression ., and sometimes it becomes a bottleneck of the cryptanalysis..In this paper we prop

Paradox 发表于 2025-3-24 16:33:46

http://reply.papertrans.cn/47/4654/465375/465375_18.png

莎草 发表于 2025-3-24 20:36:02

Side Channel Attacks on Irregularly Decimated Generatorspping fault analysis. We also modify the attacks to non side-channel cryptanalyses, but on the assumption that the key/IV mixing is not well designed. This paper hopes to provide more understanding on actual hardware implementations of IDG as cipher components. Finally, we combine our fault analysis

obviate 发表于 2025-3-25 01:36:14

http://reply.papertrans.cn/47/4654/465375/465375_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2007; 10th International C Kil-Hyun Nam,Gwangsoo Rhee Conference proceedings 2007 Springer-Verl