变色龙 发表于 2025-3-30 10:43:19
A Game-Theoretic Perspective on Oblivious Transferrivacy, and fairness in two-party protocols in the presence of fail-stop adversaries. Based on their work, we characterize the properties of “two-message” oblivious transfer protocols by using a game-theoretic concept. Specifically, we present a single two-player game for two-message oblivious trans感染 发表于 2025-3-30 13:21:38
http://reply.papertrans.cn/47/4655/465415/465415_52.png白杨 发表于 2025-3-30 17:50:00
http://reply.papertrans.cn/47/4655/465415/465415_53.pngMIRE 发表于 2025-3-30 22:46:31
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo exploits low key-dependency in a key expanding function, the block ciphers having a simple key expanding function are likely to be vulnerable to the MITM attack. On the other hand, such a simple key expanding function leads compact implementation, and thus is utilized in several lightweight block cEvolve 发表于 2025-3-31 01:31:22
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camelliaound inbound phase that requires 2. computations, while the previous work requires 2. computations (. is a size of the S-box). The new method also improves the number of rounds which can be attacked. Then, we apply the new procedure to Camellia. After several optimizations for Camellia, it is shownimmunity 发表于 2025-3-31 05:23:52
http://reply.papertrans.cn/47/4655/465415/465415_56.pnggrenade 发表于 2025-3-31 13:11:33
http://reply.papertrans.cn/47/4655/465415/465415_57.pngsulcus 发表于 2025-3-31 14:53:11
http://reply.papertrans.cn/47/4655/465415/465415_58.pngcoagulation 发表于 2025-3-31 18:31:56
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphersnces of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals