DAUNT 发表于 2025-3-26 21:14:12
http://reply.papertrans.cn/87/8642/864126/864126_31.png肉体 发表于 2025-3-27 02:16:56
http://reply.papertrans.cn/87/8642/864126/864126_32.png大量 发表于 2025-3-27 06:16:41
http://reply.papertrans.cn/87/8642/864126/864126_33.png卧虎藏龙 发表于 2025-3-27 12:05:58
http://reply.papertrans.cn/87/8642/864126/864126_34.png吝啬性 发表于 2025-3-27 16:14:10
http://reply.papertrans.cn/87/8642/864126/864126_35.pngSpongy-Bone 发表于 2025-3-27 21:30:02
http://reply.papertrans.cn/87/8642/864126/864126_36.pngrheumatism 发表于 2025-3-27 23:37:11
http://reply.papertrans.cn/87/8642/864126/864126_37.png罐里有戒指 发表于 2025-3-28 02:09:24
http://reply.papertrans.cn/87/8642/864126/864126_38.png推崇 发表于 2025-3-28 08:55:41
On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysist implementations, the security is not well understood, in particular for larger values of the partitioning number which indicates the number of subblocks. For both differential and linear cryptanalysis, we first prove tighter lower bounds on the minimum number of active S-boxes for four and six rouperjury 发表于 2025-3-28 10:39:32
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTANthat are applicable to the KTANTAN family of block ciphers accepting a key of 80 bits. The attacks are due to some weaknesses in its bitwise key schedule. We report an attack of time complexity 2. encryptions on the full KTANTAN32 cipher with only 3 plaintext/ciphertext pairs and well as 2. encrypti