NAG 发表于 2025-3-25 04:20:51

0302-9743 ections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.978-3-642-19573-0978-3-642-19574-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

nonchalance 发表于 2025-3-25 10:13:09

Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round , and ,,We start with a 22-round generic attack on the structure of ., and adapt it to the actual round function to attack 24-round . (the full function has 32 rounds). We follow with an attack on 9-round .. which also works for the tweaked version of ...

Condescending 发表于 2025-3-25 12:22:46

http://reply.papertrans.cn/87/8642/864126/864126_23.png

Harbor 发表于 2025-3-25 17:10:20

Improving DPA by Peak Distribution Analysishost peaks to diminish the ghost peaks themselves and bring forward the correct key candidate. The EDPA can be combined with any standard DPA attack irrespective of the distinguisher used. We illustrate that EDPA improves on DPA with both simulations and experiments on smart cards.

Calculus 发表于 2025-3-25 21:22:35

http://reply.papertrans.cn/87/8642/864126/864126_25.png

衰老 发表于 2025-3-26 00:49:39

Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round , and ,,ation property in the round function. This new technique allows to efficiently use the degrees of freedom available to attack a hash function. Using the cancellation property, we can avoid the non-linear parts of the round function, at the expense of some freedom degrees..Our attacks are mostly inde

Blasphemy 发表于 2025-3-26 06:36:08

http://reply.papertrans.cn/87/8642/864126/864126_27.png

Priapism 发表于 2025-3-26 11:02:38

Hill Climbing Algorithms and Triviumons. We show how heuristic optimization methods such as hill climbing algorithms can be relevant to solving systems of multivariate equations. A characteristic of equation systems that may be efficiently solvable by the means of such algorithms is provided. As an example, we investigate equation sys

Kidnap 发表于 2025-3-26 15:10:04

http://reply.papertrans.cn/87/8642/864126/864126_29.png

Crepitus 发表于 2025-3-26 17:25:22

The Rise and Fall and Rise of Combinatorial Key Predistributionr than provide online key distribution. The problem of how most effectively to predistribute keys is inherently combinatorial. We revisit some early combinatorial key predistribution shemes and discuss their limitations. We then explain why this problem is back “in fashion” after a period of limited
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Selected Areas in Cryptography; 17th International W Alex Biryukov,Guang Gong,Douglas R. Stinson Conference proceedings 2011 Springer Berli