Halloween 发表于 2025-3-21 16:21:45

书目名称Information Security and Cryptology - ICISC 2000影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465395<br><br>        <br><br>书目名称Information Security and Cryptology - ICISC 2000读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465395<br><br>        <br><br>

Adenocarcinoma 发表于 2025-3-21 22:23:33

On the strength of KASUMI without FL functions against Higher Order Differential Attack,We attacked KASUMI without FL functions by using Higher Order Differential Attack. The necessary order of Higher Order Differential Attack depends on the degree of F function and it is determined by the chosen plaintext. We found effective chosen plaintext which enables the attack to 4 round KASUMI

temperate 发表于 2025-3-22 04:00:11

http://reply.papertrans.cn/47/4654/465395/465395_3.png

MAIM 发表于 2025-3-22 07:40:57

Difference Distribution Attack on DONUT and Improved DONUT,ed two block cipher families COCONUT and PEANUT. Wagner[.] suggested a new differential-style attack called boomerang attack and cryptanalyzed COCONUT’98. Cheon[.] suggested a new block cipher DONUT which was made by two pairwise perfect decorrelation modules and is secure against boomerang attack.

Intellectual 发表于 2025-3-22 09:07:11

http://reply.papertrans.cn/47/4654/465395/465395_5.png

BOAST 发表于 2025-3-22 16:19:34

http://reply.papertrans.cn/47/4654/465395/465395_6.png

Feigned 发表于 2025-3-22 18:41:38

Fast Universal Hashing with Small Keys and No Preprocessing: The , Construction,II (achieving a collision probability in the range 2-.-2-.). Unlike most proposals, PolyR actually hashes short messages faster (per byte) than long ones. At the same time, its key is only a few bytes, the output is only a few bytes, and no “preprocessing” is needed to achieve maximal efficiency. Ou

CANDY 发表于 2025-3-22 23:53:04

Characterization of Elliptic Curve Traces Under FR-Reduction,ction([.],[.]) and anomalous elliptic curve over Fq ([.],[.],[.]), then with current knowledge we can construct elliptic curve cryptosystems over a smaller definition field. ECDLP has an interesting property that the security deeply depends on elliptic curve traces rather than definition fields, whi

傲慢物 发表于 2025-3-23 02:35:21

http://reply.papertrans.cn/47/4654/465395/465395_9.png

saturated-fat 发表于 2025-3-23 06:10:03

Secure Matchmaking Protocol,acy. In this study we define the concept of matchmaking and construct a simple and efficient matchmaking protocol under the simple rule that two members become a matched pair only when they have chosen each other. In matchmaking protocol, participant’s privacy is of prime concern, specially losers’
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2000; Third International Dongho Won Conference proceedings 2001 Springer-Verlag Berlin Heidel