peak-flow 发表于 2025-3-25 05:27:37
On Multidimensional Linear Cryptanalysisn . statistically independent approximations. Started by Hermelin . in ACISP’08, a different approach was taken by studying .-dimensional combined approximations from . base approximations. Known as multidimensional linear cryptanalysis, the requirement for statistical independence is relaxed. In th口诀法 发表于 2025-3-25 08:44:58
http://reply.papertrans.cn/47/4655/465411/465411_22.pngchronicle 发表于 2025-3-25 13:59:37
http://reply.papertrans.cn/47/4655/465411/465411_23.png首创精神 发表于 2025-3-25 16:40:41
http://reply.papertrans.cn/47/4655/465411/465411_24.png为宠爱 发表于 2025-3-25 21:21:35
Second-Preimage Analysis of Reduced SHA-1 why the widely used SHA-1 continues to be recommended in all applications except digital signatures after 2010. Recent work on preimage and second preimage attacks on reduced SHA-1 succeeding up to 48 out of 80 steps (with results barely below the 2. time complexity of brute-force search) suggest t平息 发表于 2025-3-26 01:23:04
http://reply.papertrans.cn/47/4655/465411/465411_26.png包裹 发表于 2025-3-26 07:45:03
Adaptive and Composable Non-committing Encryptionsthe universally composable (UC) framework. We show that the proposed non-committing scheme realizes the UC-security in the presence of adaptive adversary assuming that the decisional Diffie-Hellman problem is hard.Contracture 发表于 2025-3-26 08:39:29
http://reply.papertrans.cn/47/4655/465411/465411_28.pngConducive 发表于 2025-3-26 14:34:23
Strong Knowledge Extractors for Public-Key Encryption Schemestroduce two extractor-based properties that allow us to gain insight into the design of such schemes and to go beyond known feasibility results in this area. We formalise . and . and prove their suitability in realising these goals. Strong plaintext awareness imposes that it is infeasible to construscrape 发表于 2025-3-26 18:11:38
http://reply.papertrans.cn/47/4655/465411/465411_30.png