要塞 发表于 2025-3-26 23:43:59

http://reply.papertrans.cn/87/8642/864129/864129_31.png

忘川河 发表于 2025-3-27 04:07:29

The Cryptanalysis of Reduced-Round SMS4(it is used in wireless networks in China) and a range of differential attacks break up to 21 of the 32 rounds used in SMS4. Here we consider the application of linear cryptanalysis to the cipher and we demonstrate a simple attack on 22 rounds of SMS4. We also consider some advanced linear cryptanal

RACE 发表于 2025-3-27 07:36:43

http://reply.papertrans.cn/87/8642/864129/864129_33.png

ANIM 发表于 2025-3-27 11:24:44

Lifting and Elliptic Curve Discrete Logarithmsndex calculus is a lifting algorithm that solves the classical finite field discrete logarithm problem in subexponential time, but no such algorithm is known in general for elliptic curves. It turns out that there are four distinct lifting scenarios that one can use in attempting to solve the ECDLP;

不安 发表于 2025-3-27 16:09:44

http://reply.papertrans.cn/87/8642/864129/864129_35.png

附录 发表于 2025-3-27 18:23:32

http://reply.papertrans.cn/87/8642/864129/864129_36.png

BLUSH 发表于 2025-3-28 01:22:51

http://reply.papertrans.cn/87/8642/864129/864129_37.png

amorphous 发表于 2025-3-28 05:09:40

Counting Functions for the ,-Error Linear Complexity of 2,-Periodic Binary Sequences decrease drastically when a few symbols are changed. Hence there has been considerable interest in the .-error linear complexity of sequences which measures this instability in linear complexity. For 2.-periodic sequences it is known that minimum number of changes needed per period to lower the lin

Munificent 发表于 2025-3-28 07:06:48

On the Exact Success Rate of Side Channel Analysis in the Gaussian Modelards. Faced with this threat, it is of crucial importance to precisely determine what is achievable by a given side channel adversary against a cryptosystem producing a given side channel leakage. This can be answered by evaluating the success rate of an attack according to the adversary capacities

Fluctuate 发表于 2025-3-28 11:11:32

Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registersed by a non linear Boolean function. In this paper we focus on the dual construction, namely a linearly filtered Non linear Feedback Shift Register (NFSR). We show that the existing algebraic and correlation attacks against the filter generator can be transposed to mount algebraic or correlation att
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Selected Areas in Cryptography; 15th Annual Internat Roberto Maria Avanzi,Liam Keliher,Francesco Sica Conference proceedings 2009 Springer-