畸齿矫正学 发表于 2025-3-21 16:52:36

书目名称Information Security and Cryptology – ICISC 2006影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465383<br><br>        <br><br>书目名称Information Security and Cryptology – ICISC 2006读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465383<br><br>        <br><br>

过分 发表于 2025-3-21 23:14:43

Generic Attacks on Symmetric Cipherspecially with respect to DES. An interesting variant of exhaustive search is to use a so-called time-memory trade-off (TMTO) attack. This attack and its many variants will be described and recent research on TMTO attacks will be surveyed. The effectiveness of generic attacks is determined by improve

几何学家 发表于 2025-3-22 03:56:37

Improved Collision Attack on the Hash Function Proposed at PKC’98sh computations, while the previous attack of Chang . presented at SAC 2002 has a complexity of about 2. hash computations. In the analysis of the hash function we combined existing approaches with recent results in cryptanalysis of hash functions. We show that message-dependent rotations can be exp

MAZE 发表于 2025-3-22 08:18:31

Birthday Paradox for Multi-collisionsshing .=.. times. We first show that this probability is at most 1/.! which is very small for large .. We next show that by hashing (.!). ×. times, an .-collision is found with probability approximately 0.5 for sufficiently large .. Note that if .=2, it coincides with the usual birthday paradox. Hen

Multiple 发表于 2025-3-22 09:57:31

New Variant of the Self-Shrinking Generator and Its Cryptographic Propertiese the selection rule is determined by the XORed value of a couple of bits. It is shown that the period and the linear complexity of an output sequence of SSG-XOR are better than those of the self-shrinking generator. It is also shown that the SSG-XOR generator has meaningful advantages from the view

Dealing 发表于 2025-3-22 14:51:34

On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher of matrices for increasing efficiency in software implementations of the binary matrix. We estimate a security against cryptanlysis when the binary matrix is used as a diffusion layer of a 256-bit SPN block cipher with an 8-bit s-box as a substitution layer in a round function. Also we describe the

Ostrich 发表于 2025-3-22 18:14:39

On Algebraic Immunity and Annihilators for computing the optimal annihilator of . and .(.) are inefficient. This work consists of two parts. In the first part, we extend the concept of algebraic immunity. In particular, we argue that a function . may be replaced by another boolean function .. called the algebraic complement of .. This m

喃喃而言 发表于 2025-3-22 23:15:04

High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theoremth modified radix-4 Montgomery multiplication algorithm and Chinese Remainder Theorem (CRT). Our design takes 0.84M clock cycles for a 1024-bit modular exponentiation and 0.25M clock cycles for two 512-bit exponentiations. Using 0.18 um standard cell library, the processor achieves 365Kbps for a 102

Congruous 发表于 2025-3-23 02:38:44

http://reply.papertrans.cn/47/4654/465383/465383_9.png

Obscure 发表于 2025-3-23 07:29:04

http://reply.papertrans.cn/47/4654/465383/465383_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology – ICISC 2006; 9th International Co Min Surp Rhee,Byoungcheon Lee Conference proceedings 2006 Springer-V