disparage 发表于 2025-3-25 03:23:18
State Convergence in the Initialisation of Stream Ciphersr generates a different keystream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.alcohol-abuse 发表于 2025-3-25 10:07:21
Conference proceedings 2011 Australia, in July 2011. The 24 revised full papers presentedtogether with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.山顶可休息 发表于 2025-3-25 12:04:18
On Known and New Differentially Uniform Functionse search for more of such functions is necessary. We propose a way of designing functions which can possibly be APN or differentially 4-uniform and be bijective. We illustrate it with an example of a differentially 4-uniform (.,.)-permutation for . odd, based on the power function .. over the second水獭 发表于 2025-3-25 19:31:37
http://reply.papertrans.cn/47/4655/465405/465405_24.png拖债 发表于 2025-3-25 21:12:01
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attackslters in a linear feedback shift register based nonlinear filter generator, such that probabilistic algebraic attacks outperform deterministic ones. Then we introduce two notions, algebraic immunity distance and .-error algebraic immunity, to measure the ability of Boolean functions resistant to proBadger 发表于 2025-3-26 00:29:21
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Repres maximum algebraic immunity (MAI Boolean functions) by using univariate polynomial representation of Boolean functions over finite fields have received more and more attention. In this paper, how to obtain more MAI Boolean functions from a known MAI Boolean function under univariate polynomial repre辞职 发表于 2025-3-26 06:56:49
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis last round key with . plaintext-ciphertext pairs, then its time complexity is .. In this paper, we show that by applying the . and . to the Algorithm 2 of multidimensional linear cryptanalysis, we can reduce the time complexity of the attack to ., where . is 3(. + .) or 4. + 3. . The resulting attanotice 发表于 2025-3-26 08:46:14
http://reply.papertrans.cn/47/4655/465405/465405_28.png尽责 发表于 2025-3-26 13:23:42
http://reply.papertrans.cn/47/4655/465405/465405_29.png平淡而无味 发表于 2025-3-26 17:42:47
http://reply.papertrans.cn/47/4655/465405/465405_30.png