Accrue 发表于 2025-3-25 06:26:02

https://doi.org/10.1007/3-540-45067-Xcryptography; data security; digital; information; privacy; security; algorithm analysis and problem compl

Dendritic-Cells 发表于 2025-3-25 07:30:02

978-3-540-40515-3Springer-Verlag Berlin Heidelberg 2003

LUMEN 发表于 2025-3-25 12:41:35

Information Security and Privacy978-3-540-45067-2Series ISSN 0302-9743 Series E-ISSN 1611-3349

Leisureliness 发表于 2025-3-25 16:38:22

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465430.jpg

Fortuitous 发表于 2025-3-25 23:00:21

On the Pseudorandomness of KASUMI Type PermutationsKASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. We show that

Overthrow 发表于 2025-3-26 00:17:10

http://reply.papertrans.cn/47/4655/465430/465430_26.png

训诫 发表于 2025-3-26 05:06:37

The Unsolvable Privacy Problem and Its Implications for Security Technologiesat there are strong incentives for decreasing privacy, rooted in the economic benefits of price discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price discriminate and the public dislike of this practice will influence what security technologies are likely to succeed.

ICLE 发表于 2025-3-26 09:26:36

An Addition Algorithm in Jacobian of , , Curve the forms of Groebner bases of all ideals involved in the addition in Jacobian, and by computing Groebner bases of ideals without using Buchberger algorithm. The algorithm computes the addition in Jacobian of C. curves in about 3 times amount of computation of the one in elliptic curves, when the sizes of groups are set to be the same.

cardiopulmonary 发表于 2025-3-26 16:29:54

Differential Fault Analysis on AES Key Schedule and Some Countermeasures It efficiently finds the key of AES-128 with feasible computation and less than thirty pairs of correct and faulty ciphertexts. Several countermeasures are also proposed. This weakness can be resolved without modifying the structure of the AES algorithm and without decreasing the efficiency.

Cardiac 发表于 2025-3-26 17:29:09

http://reply.papertrans.cn/47/4655/465430/465430_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Privacy; 8th Australasian Con Rei Safavi-Naini,Jennifer Seberry Conference proceedings 2003 Springer-Verlag Berlin