Esalate 发表于 2025-3-28 15:20:08

http://reply.papertrans.cn/47/4655/465409/465409_41.png

myocardium 发表于 2025-3-28 19:18:43

0302-9743 15, held in Brisbane, QLD, Australia, in June/July 2015..The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital

PHIL 发表于 2025-3-29 00:20:01

Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemesird layers and CTR mode in the middle. The weak keys of polynomial evaluation hash in message authentication code and authenticated encryption have been thoroughly analyzed, but have never applied in TES. We point out that XCB, HCTR and HCH (and two variations of HCH: HCHp and HCHfp) can not resist

formula 发表于 2025-3-29 03:45:54

Cryptanalysis of Reduced-Round ,nalysis on .. Firstly, we focus on security properties at the hash function level by presenting (second) preimage, collision and distinguishing attacks on reduced-round .. In order to launch the preimage attack, we have to slightly tweak the original Meet-in-the-Middle preimage attack framework on .

alcohol-abuse 发表于 2025-3-29 11:12:09

Improving the Biclique Cryptanalysis of AES constructing bicliques with size . and reducing the number of S-boxes computed in the matching phase. Their results were improved later by better selections of differential characteristics in the biclique construction. In this paper, we improve the biclique attack by increasing the biclique size to

vibrant 发表于 2025-3-29 14:38:32

http://reply.papertrans.cn/47/4655/465409/465409_46.png

Texture 发表于 2025-3-29 18:07:25

Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptionsd allows the sender to dynamically choose the authorized set and the decryption threshold at the time of encryption. Currently, the only known dynamic TPKE scheme is a scheme proposed by Delerablée and Pointcheval (CRYPTO 2008). This scheme is proven to provide message confidentiality under a .-type

增减字母法 发表于 2025-3-29 22:12:36

Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Messagehash functions. In this paper, we show that by utilizing popular Sponge constructions in OAEP framework, we can eliminate the need of such hash functions. We provide a new scheme in OAEP framework based on Sponge construction and call our scheme . (SpAEP). SpAEP is based on 2 functions: Sponge and S

合并 发表于 2025-3-30 00:21:30

Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS In particular, recent improvements on horizontal power analysis [., .] render ineffective the usual counter-measures which randomize the data at the very beginning of the computations [., .]. To counteract horizontal analysis it is necessary to randomize the computations all along the exponentiatio

Allowance 发表于 2025-3-30 05:02:28

Towards Forward Security Properties for PEKS and IBEf the long-term secret keys is compromised in the future. In this paper, we investigate some forward security properties for Public-key Encryption with Keyword Search (PEKS) schemes, which allow a client to store encrypted data and delegate search operations to a server. The proposed properties guar
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Privacy; 20th Australasian Co Ernest Foo,Douglas Stebila Conference proceedings 2015 Springer International Publis