有恶臭 发表于 2025-3-23 11:16:47
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALcollision attack, our method focuses on the multi-collision of the compression function. For MD4, we utilize two different feasible collision differential paths to find a 4-collision with about 2. MD4 computations. For 3-Pass HAVAL, we can find a 4-collision with complexity about 2. and a 8-near-collision with complexity 2..Apoptosis 发表于 2025-3-23 16:35:52
http://reply.papertrans.cn/47/4654/465375/465375_12.pnganus928 发表于 2025-3-23 21:30:46
Cryptanalysis of a Hash Function Proposed at ICISC 2006A simple method for constructing collisions for Shpilrain’s polynomial-based hash function from ICISC 2006 is presented. The attack relies on elementary linear algebra and can be considered as practical: For the parameters suggested, we give a specific collision, computed by means of a computer algebra system.Accede 发表于 2025-3-23 22:35:01
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006ID. In this paper, we present an impossible differential attack on 25-round HIGHT, a related-key rectangle attack on 26-round HIGHT, and finally a related-key impossible differential attack on 28-round HIGHT. Our result suggests that the safety margin of HIGHT decreases from the originally expectedIndelible 发表于 2025-3-24 03:03:09
A Cryptanalysis of the Double-Round Quadratic Cryptosystemlthough these first schemes were broken, many others followed, leading to a very active field known as Multivariate cryptography. In this paper, we show how to break one of these schemes, the Double-Round Quadratic cryptosystem from . We stress that this cryptosystem has, in practice, already be全神贯注于 发表于 2025-3-24 08:08:38
Improving the Time Complexity of Matsui’s Linear Cryptanalysis Fourier Transform. Using this improvement, the time complexity decreases from .(2.*2.) to .(.*2.), where . is the number of bits in the keyguess. This improvement is very generic and can be applied against a broad variety of ciphers including SPN and Feistel schemes. In certain (practically meaning不能平静 发表于 2025-3-24 13:46:58
On Large Distributions for Linear Cryptanalysisn . (or a noise variable) be expressed via . mutually independent and uniformly distributed .-bit random variables .., .., ..., ... The possibility to construct its distribution depends on the form of the expression ., and sometimes it becomes a bottleneck of the cryptanalysis..In this paper we propParadox 发表于 2025-3-24 16:33:46
http://reply.papertrans.cn/47/4654/465375/465375_18.png莎草 发表于 2025-3-24 20:36:02
Side Channel Attacks on Irregularly Decimated Generatorspping fault analysis. We also modify the attacks to non side-channel cryptanalyses, but on the assumption that the key/IV mixing is not well designed. This paper hopes to provide more understanding on actual hardware implementations of IDG as cipher components. Finally, we combine our fault analysisobviate 发表于 2025-3-25 01:36:14
http://reply.papertrans.cn/47/4654/465375/465375_20.png