要塞 发表于 2025-3-26 23:43:59
http://reply.papertrans.cn/87/8642/864129/864129_31.png忘川河 发表于 2025-3-27 04:07:29
The Cryptanalysis of Reduced-Round SMS4(it is used in wireless networks in China) and a range of differential attacks break up to 21 of the 32 rounds used in SMS4. Here we consider the application of linear cryptanalysis to the cipher and we demonstrate a simple attack on 22 rounds of SMS4. We also consider some advanced linear cryptanalRACE 发表于 2025-3-27 07:36:43
http://reply.papertrans.cn/87/8642/864129/864129_33.pngANIM 发表于 2025-3-27 11:24:44
Lifting and Elliptic Curve Discrete Logarithmsndex calculus is a lifting algorithm that solves the classical finite field discrete logarithm problem in subexponential time, but no such algorithm is known in general for elliptic curves. It turns out that there are four distinct lifting scenarios that one can use in attempting to solve the ECDLP;不安 发表于 2025-3-27 16:09:44
http://reply.papertrans.cn/87/8642/864129/864129_35.png附录 发表于 2025-3-27 18:23:32
http://reply.papertrans.cn/87/8642/864129/864129_36.pngBLUSH 发表于 2025-3-28 01:22:51
http://reply.papertrans.cn/87/8642/864129/864129_37.pngamorphous 发表于 2025-3-28 05:09:40
Counting Functions for the ,-Error Linear Complexity of 2,-Periodic Binary Sequences decrease drastically when a few symbols are changed. Hence there has been considerable interest in the .-error linear complexity of sequences which measures this instability in linear complexity. For 2.-periodic sequences it is known that minimum number of changes needed per period to lower the linMunificent 发表于 2025-3-28 07:06:48
On the Exact Success Rate of Side Channel Analysis in the Gaussian Modelards. Faced with this threat, it is of crucial importance to precisely determine what is achievable by a given side channel adversary against a cryptosystem producing a given side channel leakage. This can be answered by evaluating the success rate of an attack according to the adversary capacitiesFluctuate 发表于 2025-3-28 11:11:32
Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registersed by a non linear Boolean function. In this paper we focus on the dual construction, namely a linearly filtered Non linear Feedback Shift Register (NFSR). We show that the existing algebraic and correlation attacks against the filter generator can be transposed to mount algebraic or correlation att